To see the other types of publications on this topic, follow the link: Social security – Zambia – Management.

Dissertations / Theses on the topic 'Social security – Zambia – Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Social security – Zambia – Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Moonga, Fred. "Social protection for vulnerable children in Zambia." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96875.

Full text
Abstract:
Thesis (PhD)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: This study focused on the social protection of vulnerable children in Zambia. The aim was to find out how social protection had evolved and how it was conceptualised – its functions and types, policies and programmes, the benefits and services, and the risks and vulnerabilities that it addresses. A descriptive study design was used with qualitative methods of collecting and analysing data. The sample of 24 participants from government and nongovernmental organisations involved in social protection delivery as well as carers of children was drawn from the Central, Lusaka and Southern provinces of Zambia respectively. A semi-structured interview schedule was used, and all the recorded interviews were transcribed by the researcher and sent back to the participants for proofreading or corrections, where necessary, before analysis. The basic needs, the empowerment, the risk management, the rights-based, and the capability approaches have been used to further the conceptualization, design features and implementation modalities of social protection. Additionally, given that a theoretical basis for social protection is still lacking, the study drew on representational, explanatory, normative, human capital, social construction, social contractual, and structural social work theories in order to complement, extend and verify the findings. Ethical clearance (number Desc_Moonga2012) was obtained from Stellenbosch University’s Research Ethics Committee. The ethical clearance certificate was used to apply for and obtain permission from the Zambian Ministry of Community Development Mother and Child Health and nongovernmental organisations involved in the study. Empirically, the study found that social protection was an old activity under a new name and was being scaled up rapidly but biased towards cash transfers. By and large, social protection in Zambia is provided as unconditional transfers, mainly as social assistance. No existing legislative or policy framework specifically focused on social protection was found, although the latter had been drafted at the time of the study. The Zambian government and a number of partners such as CARE, Child Fund, World Vision and the World Food Programme, to mention only a few, were found to be involved, but their efforts were fragmented and interventions for children were limited, fragmented and less responsive to the current risks and vulnerabilities of children. The study also established that if 2–3% of the country’s gross domestic product as recommended by the International Labour Organization were used, Zambia could afford to provide extensive social protection coverage (beyond its current offering) by using local resources. However, this would require putting in place appropriate and sustainable resource mobilisation measures and decentralization of the processes and interventions. Based on these and other concluding findings, it is recommended that in order for social protection for vulnerable children in Zambia to be effective, among other requirements, political will is needed in the provision of social protection for vulnerable groups, especially children, through legislative and policy frameworks. Additionally, there is a need for sustainable resource mobilisation, especially through progressive taxation such as taxation of undeserved income and taxation of big businesses, especially mining companies. However, due to limitations in qualitative methods and descriptive designs and the small sample of the data used, the conclusions and recommendations of the study are but conjectural.
AFRIKAANSE OPSOMMING: Hierdie studie het op die maatskaplike beskerming van kwesbare kinders in Zambië gekonsentreer. Die doel was om te bepaal hoe maatskaplike beskerming ontwikkel het en gekonseptualiseer is – die soorte en funksies van maatskaplike beskerming, die beleide en programme daaroor, die voordele en dienste wat daarmee verband hou, en die gepaardgaande risiko’s en kwesbaarhede. ʼn Beskrywende navorsingsontwerp met kwalitatiewe metodes vir data-insameling en -ontleding is gebruik. Die steekproef van 24 deelnemers uit die staatsektor en nieregeringsorganisasies wat met die lewering van maatskaplike beskerming gemoeid is, sowel as kinderversorgers, het uit die Lusaka-, sentrale en suidelike provinsies van Zambië gekom. ’n Semigestruktureerde onderhoudskedule is gebruik. Die navorser het alle opnames van onderhoude getranskribeer en dit voor ontleding aan die deelnemers gestuur om te proeflees en enige nodige regstellings te maak. Die basiese behoefte-, bemagtiging-, risikobestuur-, regsgebaseerde en vermoëns benaderings is gebruik om die konseptualisering, ontwerp kenmerke en implementering van modaliteite van maatskaplike beskerming te bevorder. Benewens die gebrek aan ’n teoretiese grondslag vir maatskaplike beskerming, het die studie op die verteenwoordigende- verklarende-, normatiewe-, menslikekapitaal-, maatskaplikekonstruksie-, maatskaplikekontrak- en strukturele maatskaplikewerk-teorieë staatgemaak om die bevindinge aan te vul, uit te brei en na te gaan. Etiekgoedkeuring (nommer Desc_Moonga2012) is van die Universiteit Stellenbosch se Navorsingsetiekkomitee verkry. Die etiekgoedkeuringsertifikaat is op sy beurt gebruik om toestemming te vra en te verkry van die Zambiese Ministerie van Gemeenskapsontwikkeling en Moeder- en Kindergesondheid en nieregerings-organisasies wat by die studie betrokke was. Die empiriese bevinding van die studie is dat maatskaplike beskerming ’n ou aktiwiteit met ’n nuwe naam is, en dat dit vinnig uitgebrei word, dog na kontant-oorplasings oorhel. Maatskaplike beskerming in Zambië geskied merendeels as onvoorwaardelike oorplasings, hoofsaaklik in die vorm van maatskaplike bystand. Geen bestaande regs- of beleidsraamwerk wat bepaald oor maatskaplike beskerming handel, kon opgespoor word nie, hoewel werk aan ’n beleidsraamwerk ten tyde van die studie aan die gang was. Die Zambiese regering en ’n aantal vennote, waaronder CARE, Child Fund, World Vision en die Wêreldvoedselprogram, om net enkeles te noem, is betrokke by maatskaplike beskerming dienslewering, maar hul pogings is gefragmenteer. Veral intervensies vir kinders is beperk, gefragmenteer en nie juis ingestel op die kinders se huidige risiko’s en kwesbaarhede nie. Daarbenewens het die studie vasgestel dat indien 2–3% van die land se bruto binnelandse produk gebruik word, soos wat die Internasionale Arbeidsorganisasie aanbeveel, Zambië kan bekostig om met behulp van plaaslike hulpbronne omvattende maatskaplike beskerming (wat verder strek as sy huidige aanbod) te bied. Dít sou egter vereis dat toepaslike en volhoubare maatreëls en desentralisering van prosesse en intervensies ingestel word om hulpbronne te mobiliseer. Op grond van hierdie en ander bevindinge is die gevolgtrekking dat maatskaplike beskerming vir kwesbare groepe in Zambië slegs doeltreffend sal wees indien die nodige politieke wil bestaan om deur regs- en beleidsraamwerke maatskaplike beskerming aan hierdie groepe, veral kinders, te voorsien. Daar bestaan ook ’n behoefte aan volhoubare hulpbronmobilisering, veral deur progressiewe belasting soos belasting op onverdiende inkomste en belasting op groot ondernemings, bepaald mynmaatskappye. Weens die beperkinge van kwalitatiewe metodes en deskriptiewe ontwerpe, sowel as die klein datasteekproef wat gebruik is, is die gevolgtrekkings en aanbevelings van die studie egter bloot verondersteld.
APA, Harvard, Vancouver, ISO, and other styles
2

Sainz, de Baranda Pedro 1963. "Social Security reform in Spain." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/34344.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2001.
Includes bibliographical references (p. 91-92).
The Spanish public pension system is currently based on the pay as you go (PA YOO) principle. This thesis examines the current structure of this public system and its financial viability in the face of expected demographic changes. First, demographic and macroeconomic models were created extending out to 2050 and, based on them, the finances of the system were estimated assuming that the current regulations would remain largely unchanged. The simulations indicate that the system will show small surpluses for the next years followed by an alarming deterioration beyond 2020, mainly driven by demographic factors such as increasing life expectancy and the reduction in fertility rate observed in the last two decades. The baseline demographic and macroeconomic scenario results in a projected deficit of about 7% of GDP by 2045. This outlook includes a reduction of unemployment and an increase in labor force participation within reasonable limits. It is also shown that high immigration, fertility and productivity growth, again, within reasonable limits, while improving the financial outlook, do not resolve the issue. Without significant reforms, the system will be faced with a reduction in benefits and/or an increase in the payroll-tax by the second quarter of this century. The model is further used to test the effectiveness of potential reforms. We conclude that a permanent solution could be supported on three pillars: 1. The creation of a Pension Fund with the surpluses of the PAYOO system and a creative investment policy such as that recommended by Modigliani et al. 2. The contribution of the prospective surpluses from the unemployment system (INEM) to the fund during a transitory period. 3. Reforms in the pension calculating procedures that will foster participation in the labor force and eliminate some of the distortions introduced by the current system. These reforms would maintain financial viability without having to raise the payroll-tax. Furthermore, the tax could be reduced gradually beyond 2045. Additionally, this reform would combine advantages from funded pension systems, such as deepening of the capital stock and consolidation of the financial markets, with those of PAYOO schemes, such as their redistributive aspects and "defined benefit" character.
by Pedro Sainz de Baranda.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
3

Lukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.

Full text
Abstract:
Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
APA, Harvard, Vancouver, ISO, and other styles
4

Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.

Full text
Abstract:
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem that this thesis study deals with is the central management of a large number and variety of services that provide organization-wide network and information security. This study addresses two problem areas: how to better manage the security of a network, and how to explain the security issues to upper management better. The study proposes a Security Management System (SMS) to be used for network security management, monitoring and reporting purposes. The system is a custom made, central management solution, which combines the critical performance indicators of the security devices and presents the results via web pages.
APA, Harvard, Vancouver, ISO, and other styles
5

Humpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-143696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Woodcock, Jody. "Leveraging social media to engage the public in homeland security." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FWoodcock.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Josefek, Robert. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Citizen Engagement, Web 2.0, Social Media, Social Networking, Twitter, Blogs, Emergency Management, Homeland Security, Communications, Crisis Informatics, Preparedness, Response, Recovery, Fear, Panic, California Wildfires, Virginia Tech, OGMA, Trust. Two Way Communications, NIMS, Incident Command, Wikis, Information Sharing, Israel, Networked Homeland Security, Public Information, Emergent Behavior, Crisis, Disaster. Includes bibliographical references (p. 111-114). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Holmstedt, Malena. "Social Media Risk Management : and the impact on organization IT security." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79296.

Full text
Abstract:
The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. This study looked at social media risk management and what impact it could have on organizations IT security through prior studies done and through data collected from semi structured interviews and surveys.  Social media risk management was according to this study performed mostly reactive and a majority of the organizations did not have risk management specifically for social media. More organizations had a social media policy than performed risk management for social media.  The risk management for social media in the IT organizations in this study was described in the interviews as reactive due to several reasons: old systems that made it hard to be proactive, lack of time for prioritizing social media risks or risk management for social media was currently being worked on.  The proactive IT organizations described themselves to have a general security policy and risk management plans for basically everything. Social media risks can lead to risks that impacts organization IT security.  In the interview notes five quotes was found that could be considered to suit the risks themes found in prior studies.
APA, Harvard, Vancouver, ISO, and other styles
9

Munshedzi, Thivhakoni Kingsley. "An assessment of the impact of the management of the social security system on access to services in Limpopo Province." Thesis, University of Limpopo, 2016. http://hdl.handle.net/10386/1574.

Full text
Abstract:
Thesis (M. Dev.) -- University of Limpopo, 2016
In attacking poverty in post-apartheid South Africa, the country’s new government adopted a multiple approach focusing on building institutions and organisations on a macro regional and local level, levels to facilitate growth, reconstruction and social upliftment. In its effort to alleviate poverty and inequality, the Government of South Africa introduced a social security system. In an endeavour to address the deficiencies surrounding this system, the government has established a number of mechanisms. In order to distribute these grants to the right people in the right place, the government formed the South African Social Security Agency (SASSA). The research problem was, therefore, to find out how the management and administration of social security by SASSA is enhancing or retarding access to the services for which the agency was established to render. The aim of this study was to assess how the management and administration of the social security system impact on the accessibility of social services by those who require them. In order to achieve the aim of this study, the following objectives were addressed: how social security is managed in the Limpopo Province; to assess the impact of the management of the system on access to services; to identify possible strategies that could enhance access to social security services; and to provide recommendations based on the literature and research findings. The findings of this study was that the administration system of the South African grant system has been somewhat cumbersome for both the applicant and the administrator because the forms used for most grants are detailed and often quite technical. Furthermore, it was established that were service delivery challenges of severe staff shortages at critical operational levels where grant applications are processed and infrastructural challenges such as insufficient office space (too many staff members in a specific office) and insufficient or no connectivity at certain service delivery points. These are all organisational challenges that SASSA is facing. This research recommend that the Limpopo regional office must not only be responsible for giving information about newly enrolled recipients to the SASSA national office but the regional office should be able to complete the whole process within its offices without passing it on to the national office The research also recommends that a Monitoring and Evaluation unit must be established in regional offices. This unit will assist the management and administration of social grants in particular with improving services. This unit will visit different SASSA offices in the local municipalities on a regular basis in order to evaluate the performance of those particular offices. This will help to monitor the service delivery to the beneficiaries. Lastly, SASSA should do more research and development in consultation academic institutions or by structure within SASSA offices
APA, Harvard, Vancouver, ISO, and other styles
10

Cain, Lafaun. "Social Security Administration Employee Lived Experiences of Job Satisfaction and Employee Turnover." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5311.

Full text
Abstract:
Employee turnover continues to be an issue in federal organizations, including the Social Security Administration (SSA). While issues such as retiring baby boomers and budget constraints are beyond the control of any agency, retaining employees is critical to maintain essential services. The purpose of this transcendental phenomenological study was to explore SSA employee's lived experiences of job satisfaction and employee turnover to uncover motivators and satisfaction strategies. The conceptual framework for the study was based on Maslow's human needs and Herzberg's two-factor theory. Data were collected from 20 SSA frontline employees using 6 open-ended interview questions. The data were analyzed using a modification of van Kaam's method of analysis of phenomenological data and NVivo 11 Pro. Study results revealed that time, stress, pay and benefits, public service, and interoffice relationships were the prime intrinsic and extrinsic factors participants perceived as directly related to their job satisfaction. They highly valued job enrichment programs, cohesive teams, and pay and benefits, which override daily stressors inherent to the public demands strategies for the agency. Conducting the study in depressed socioeconomic areas might also provide significant insights, particularly since stress and workload were essential dissatisfiers. SSA provides critical services to many vulnerable groups. Strategies that employees perceive as motivating enhance the quality of services and benefits to eligible American citizens, many of whom rely on these services for quality of life, thereby reducing the burden of local communities to support these individuals if SSA services fail.
APA, Harvard, Vancouver, ISO, and other styles
11

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely sufficient for providing an overall protection of information system assets. Moreover, others argue that an overall protection must include a risk transfer strategy. Hence, there is a need to understand the risk transfer approach for managing information security risks. Further, in order to effectively address the information security puzzle, there also needs to be an understanding of the nature of the perpetrators of the problem – the hackers. Though hacker incidents proliferate the news, there are few theory based hacker studies. Even though the very nature of their actions presents a difficulty in their accessibility to research, a glimpse of how hackers perpetrate attacks can be obtained through the examination of their knowledge sharing behavior. Gaining some understanding about hackers through their knowledge sharing behavior may help researchers fine-tune future information security research. The insights could also help practitioners design more effective defensive security strategies and risk management efforts aimed at protecting information systems. Hence, this dissertation is interested in understanding the hackers that perpetrate cyber-attacks on individuals and organizations through their knowledge sharing behavior. Then, of interest also is how individuals form their URL click-through intention in the face of proliferated cyber risks. Finally, we explore how and why organizations that are faced with the risk of security breaches, commit to cyberinsurance as a risk management strategy. Thus, the fundamental research question of this dissertation is: how do individuals and organizations manage information security risks?
APA, Harvard, Vancouver, ISO, and other styles
12

Swartz, Eleanor. "Women and the management of household food security in Paternoster." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85864.

Full text
Abstract:
Thesis (MA)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: This study focuses on the gendered social relations that are attached to food, through an exploration of women’s management of food and food security in poor households in Paternoster, a small fishing community on the west coast of the Western Cape Province of South Africa. My study explores how women navigate the everyday provision, management and distribution of food within a context of limited resources, with food understood both in terms of sustenance and as implicated in processes whereby gender norms and larger concerns with ‘respectability’ (ordentlikheid) are established and maintained under difficult economic conditions. One of the important strategies employed to ensure food security within households in Paternoster is the establishment and maintenance by and among women of foodways in and between households. An exploration of foodways between households sheds light on the various social networks that exist in Paternoster and the important role of women within these networks. Paternoster is a space where the navigation of these issues is informed by the long history of subsistence fishing in the area and the symbolism attached to fish and fishing in the ways in which the local fishing community engages with the challenges of food security. Of particular interest is how women manage individual and/or household food security in Paternoster in the light of existing gender dynamics involved in the production, collection and consumption of food. The sharp division of labour historically has meant that women have traditionally been involved in the pre- and post-harvest sector, rather than in the actual catching of fish. This study is also driven by concerns around the impacts of the changing fishing environment on food security and social relations in this small village. One of the major consequences of these changes is the feeling of impending food insecurity experienced by many households. The increase in mechanization in marine resource use activities, drastic changes in fishing policies and the process of fisheries rights allocations as well as diminishing fish stocks are systematically impacting on the social systems and lived experiences of the people who were, and still are, heavily dependent on the fishing industry in Paternoster for their livelihoods.. Paternoster has seen the development of new sources of employment as a result of the growth of tourism, which has presented women in particular with new work opportunities, including working in guest houses and restaurants. However, this is on the low wage end. In this context the management of food security within the household and between households through maintaining foodways and established food networks is predominantly the responsibility of women.
AFRIKAANSE OPSOMMING: Hierdie studie fokus op sosiale verhoudings van gender wat verband hou met voedsel, deur‘n verkenning van vroue se bestuur van voedsel en voedselsekerheid in arm huishoudings in Paternoster, ‘n klein vissersgemeenskap aan die weskus van die Wes-Kaap Provinsie van Suid-Afrika. My studie verken hoe vroue die daaglikse voorsiening, bestuur en verspreiding van voedsel navigeer in ‘n konteks van beperkte hulpbronne, met ‘n begrip van voedsel as lewensmiddele sowel as geïmpliseer in prosesse waarin gender-norme en ‘n gerigtheid op 'ordentlikheid' onder moeilike ekonomiese omstandighede gevestig en onderhou word. Een van die belangrike strategieë wat deur en tussen vroue in huishoudings in Paternoster onderneem word om voedselsekerheid te verseker is die vestiging en onderhouding van voedselnetwerke (foodways) in en tussen huishoudings. ‘n Verkenning van voedselnetwerke tussen huishoudings werp lig op die verskeidenheid sosiale netwerke wat in Paternoster bestaan en die belangrike rol van vroue in hierdie netwerke. Paternoster is ‘n plek waar die navigasie van hierdie kwessies ingelig word deur die lang geskiedenis van bestaansvissery in die gebied sowel as die simboliek wat aan vis en visvang geheg word in die wyses waarop die plaaslike gemeenskap met die uitdagings van voedselsekerheid handel. Wat van besondere belang is, is hoe vroue individuele en huishoudelike voedselsekerheid in Paternoster bestuur in die lig van die bestaande gender-dinamika met betrekking tot die produksie, versameling en gebruik van voedsel. Die skerp historiese geslagsverdeling van arbeid het beteken dat vroue tradisioneel betrokke was in die voor- en na-oes proses, eerder as in die werklike vang van vis. Hierdie studie word ook gemotiveer deur kommer oor die impak wat die veranderende vissery-omgewing op voedselsekerheid en sosiale verhoudings in hierdie dorpie het. Een van die belangrikste gevolge van hierdie veranderinge is die gevoel van dreigende voedselonsekerheid wat deur talle huishoudings ondervind word. Die toename in meganisering in die aktiwiteite rondom die gebruik van mariene hulpbronne, die drastiese veranderinge in visserybeleid en die toekenningsproses van visregte asook die afname in visbronne impakteer sistemies op die sosiale sisteme en ervaring van die mense wat sterk afhanklik was van die visindustrie in Paternoster vir hul leeftog afhanklik was en nog steeds is. Paternoster het die ontwikkeling van nuwe bronne van werk ervaar as gevolg van die groei van toerisme. Dit het aan vroue veral nuwe werksgeleenthede gebied, insluitend werk in gastehuise en restourante. Hierdie werk was egter op die lae loonvlak. In hierdie konteks is die bestuur van voedselsekerheid binne die huishouding en tussen huishoudings, deur die handhawing van foodways en gevestigde voedselnetwerke hoofsaaklik die verantwoordelikheid van vroue.
APA, Harvard, Vancouver, ISO, and other styles
13

Mathews, Timothy J. "Professional certification| Does the security industry need a new yardstick?" Thesis, New Jersey City University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3730746.

Full text
Abstract:

National security depends on having skilled professionals leading their organizations through the preparation, mitigation, response and recovery phases of an emergent situation. The Certified Protection Professional (CPP) credential is the current yardstick that attempts to codify and measure the knowledge and competencies required for security leadership. Does the attainment of this industry credential provide adequate proof (or evidence) of proficiency of the required security leadership knowledge and competencies? During an adverse situation, it is too late to learn that the security leader does not possess the knowledge and competencies required for success.

This mixed-methods research explored the required knowledge and competency expectations of security leadership and the claims made by the leading security industry credential. The research included an extensive literature review, an evaluative study of recent security leader job descriptions, and the development and validation of a novel survey instrument designed to capture the perceptions of security leaders regarding the knowledge and competencies required for success. The survey instrument also identified the type of proof (or evidence) preferred to adequately demonstrate proficiency of the knowledge and competencies.

This research validated the CPP knowledge requirements and identified 19 key competencies necessary for security leadership. The results indicated that security leaders agree that proof of proficiency is required, and that they would prefer a certification assessment scheme with a higher level of job fidelity than the current multiple-choice test format within the CPP framework. The survey instrument provided quantitative information in support of the findings. Opportunities for improvement to security industry policy and practice are suggested along with recommendations for future research agendas.

APA, Harvard, Vancouver, ISO, and other styles
14

Adjemian-Baskerville, Maro. "Medicine from the forest: the impact of deforestation on medicinal plant availability and use in the Bilili Game Management Area, Southern Zambia." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32376.

Full text
Abstract:
Globally, deforestation is threatening medicinal plant species. Concern about this process has led to renewed interest in medicinal plant research, in an effort to discover medicinal properties before species become extinct. However, little research has been done on the local social impacts of deforestation in regions where populations depend on medicinal plants for their primary health care. This study investigates the impact of deforestation on medicinal plant availability and use in the Bilili Game Management Area in southern Zambia, where rapid deforestation is taking place, and where the local population uses medicinal plants extensively. Despite ongoing deforestation, this study found that medicinal plants are still widely available and commonly used in this area. Forest ecology, natural resource management practices and tenure systems all buffer the effects of deforestation on medicinal resources. This demonstrates that local ecological, social and historical processes must be considered in order to understand the impacts of deforestation on medicinal plant resources.
Dans le monde entier, des espèces de plantes médicinales sont ménacées par la déforestation. L'inquiétude concernant ce processus a mené à augmenter la recherche sur les plantes médicinales. Cependant, il n'existe peu de recherche sur les impacts sociaux de la déforestation dans les régions où les populations dépendent des plantes médicinales pour leurs soins de santé. La présente étude examine l'impact de la déforestation sur la disponibilité et l'utilisation des plantes médicinales dans le «Bilili Game Management Area» dans le sud de la Zambie. Il s'agit d'une région où la déforestation progresse rapidement, et où la population locale utilise très souvent des plantes médicinales. Malgré cette déforestation, cette étude a trouvé que les plantes médicinales sont encore disponibles et souvent utilisées dans cette region. L'écologie de la forêt, la gestion des ressources naturelles et le régime foncier offrent de la protection aux ressources médicinales et diminuent les impacts de la déforestation. Ceci démontre que l'écologie locale, et les processus sociaux et historiques doivent être considerés pour comprendre l'impact de la déforestation sur les plantes médicinales.
APA, Harvard, Vancouver, ISO, and other styles
15

Abe, Yuki. "Reconstructing NATO after the Cold War : from domestic social norms to international security management." Thesis, University of Sheffield, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505479.

Full text
Abstract:
This thesis examines the reconstruction of the North Atlantic Treaty Organisation (NATO) since the end of the Cold War. Conventional knowledge in International Relations argues that alliances should dissolve with the disappearance of the military threat which they were created to address. But NATO still exists and has engaged in new activities that depart from its original purpose - specifically, engaging in crisis management beyond its territorial boundary. How is it possible to explain this shift in NATO's purpose and its transformation from an anti-Communist alliance into one that is concerned with humanitarian crises? The thesis analyses this question by posing a view, based on constructivism, that 'international' organisations are developed as state leaders try to meet 'domestic' normative concerns.
APA, Harvard, Vancouver, ISO, and other styles
16

GEWANDSZNAJDER, FLAVIO. "THE INFLUENCE OF INFORMATION MANAGEMENT ON BRAZILIAN SOCIAL SECURITY DECISION-MAKING: AN EXPLORATORY STUDY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7164@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
A informação é considerada atualmente um recurso essencial para a sobrevivência e o desenvolvimento das organizações. O advento de novas tecnologias de informação e comunicação possibilitou ofertar uma enorme quantidade de dados para uso de diretores, gerentes e gestores de negócios, em uma escala jamais imaginada há poucas décadas atrás. No entanto, o uso efetivo da informação envolve uma série de aspectos que não dependem apenas da quantidade e da tecnologia, mas de fatores que permitam capitalizar o seu valor, melhorando a qualidade das decisões nas organizações. Este trabalho busca conhecer melhor a relação existente entre os processos organizacionais de gestão da informação e sua influência no processo decisório de uma grande organização pública brasileira, a Previdência Social. Para tal, foram utilizados conceitos teóricos sobre gestão da informação disseminados por Marchand, Davenport e Checkland. A pesquisa foi realizada através de análise documental, observação participante e entrevistas semi-estruturadas, utilizadas para coletar as percepções e o comportamento relativo à tomada de decisão de diversos gestores das três instituições componentes da organização. A análise dos resultados revela aspectos que poderão contribuir para um melhor entendimento dos problemas de negócio e de informação vividos pela organização estudada, e aponta alternativas que tornem mais efetivos seus processos de informação, visando o aumento da qualidade dos serviços prestados à população brasileira.
Information is nowadays considered an essential resource for the survival and development of organizations. The advent of new information and communication technologies made possible to offer an enormous amount of data for directors, managers and business executives´ use in a scale never imagined a few decades ago. Nevertheless, the effective use of information cover several aspects which not only depend on quantity or technology, but also on factors that allow to capitalize its value, improving decision quality in the organizations. This work searches to know better the existing relation between the organizational processes of information management and its influence on decision-making of a large Brazilian public organization, the Social Security. In this way, theoretical concepts about information management spread by Marchand, Davenport and Checkland were used. The research was executed through documental analysis, participant observation and semi-structured interviews, all used to collect perceptions and behavior related to decision-making of several executives of the three institutions that make up the organization. The analysis of the results reveals aspects which may bring about a better understanding of business and information problems experienced by the studied organization, as well as pointing out alternatives to turn its information processes more effective, in order to aim at quality services increase granted to Brazilian population.
APA, Harvard, Vancouver, ISO, and other styles
17

Jones, Joyce Moses. "Generational Differences among Social Security Administration Employees and Their Perception of Value." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2988.

Full text
Abstract:
Social Security Administration (SSA) managers and leaders are facing an unprecedented challenge to understand 3 to 5 generations of employees, and value the diversity of each group (Glass, 2007). Perceived lack of recognition has resulted in low morale and job satisfaction, leaving employees not feeling valued. The purpose of this qualitative, phenomenological research study was to explore, identify, and examine the lived experiences and perceptions of SSA employees to determine how managers and leaders can contribute to employee valuation. The central question and subquestions were designed to determine whether generational theory accurately described the lived experiences and perceptions of the subjects' value to the organization. Data collection included in-depth interviews with 15 employees of SSA, 5 from each of the most represented generational groups: Baby Boomers, Generation Xs, and Generation Ys. Key findings of a thematic analysis were that employees of differing generations feel valued in different ways. It was found that appreciation for each generation should be shown in a way that is meaningful to that generation, and does not reflect discrimination of another group. The results of this study contribute to positive social change by clarifying the relationship between generational differences and perception of value and provides specific recommendations to SSA managers and leaders. This guidance is an important contribution to the existing literature and will enhance social change initiatives through valuing all employees for the skills and talents they bring to the organization irrespective of age.
APA, Harvard, Vancouver, ISO, and other styles
18

Tennakoon, Mudiyanselage Hemamali Leelawardana. "The impact of information security and its related constructs on purchase intention of social commerce users." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34862/.

Full text
Abstract:
Social Networking Sites (SNS) differ from other online media in a number of aspects including the quality of content published, reach and audience, interaction frequency, accessibility, usability and immediacy. In our analysis of social commerce, we have taken into account these unique attributes of SNS and argue that social commerce differ from classical e-business models. We further maintain that the said distinctions of SNS have led to the misuse of user-generated content and abuse of users trust resulting in information security and privacy violations. Recent unfortunate incidents of security and privacy breaches have shown the negative repercussions on online businesses. In this thesis, we argue that security and privacy issues on SNS are a major barrier hindering the success of the emerging social commerce applications and preventing businesses from gaining the full economic benefit of SNS. Hence, following a deductive strategy and taking a positivist stance, the current research explores the issues of information security, privacy, and related constructs in the context of social commerce (B2C interactions) with emphasis on how they affect purchase intention. Using a systematic review of prior literature, we have identified the key concepts and related constructs of information security and privacy and the relationships between the constructs. Based on this understanding, the current study proposes to test a number of hypotheses. Data was collected using a Web-based survey administered to a sample of SNS users. The hypotheses were tested using PLS-SEM for a dataset of 514 respondents. Based on the findings of the current research, we can come to the following conclusions: (1) 'Perceived security', 'Trustworthiness', and 'Perception towards usage of information' have a direct impact on SNS users 'Purchase intention', (2) SNS users 'Perception towards privacy notices' positively affects 'Perceived privacy' and 'Perceived security', (3) 'Trustworthiness' negatively affects SNS users 'Risk perception' and 'Perceived privacy', and (4) 'Trustworthiness' of a SNS site is positively influenced by the 'perceived ability to control submitted information' and by 'Perceived privacy'. This research contributes to the body of knowledge on information security, privacy, and related constructs in a number of ways. For instance, the proposed research model which was empirically tested in the current research is the most valuable contribution. To test the proposed model, we have validated new and existing factors measuring information security constructs and purchase intention, thereby contributing to theory building. This provides a better understanding of privacy, security and related issues on SNS and explains some of the possible reasons for the slow adaptation of social commerce compared to 'classical' e-business models. From a practical and managerial point of view, this research help social media vendors to comprehend the fundamental features necessary to attract customers to their business such as building trust by enhancing security and privacy practices. Further, we suggest the use of ethical data gathering and transparent, easily accessible and readable security/privacy notices on social commerce shopping portals to help customers overcome their psychological barriers to purchase from SNS.
APA, Harvard, Vancouver, ISO, and other styles
19

Levy, Edmund. "Interagency Coordination of Security Operations in a Large U.S. Seaport." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/755.

Full text
Abstract:
Protecting U.S. transportation hubs against a wide variety of security threats, while avoiding undue interference with the normal operations of the hubs, is one of the greatest challenges facing security agencies. The problem addressed in this study was the limited information on the contributing factors to seaport security. The purpose of this case study was to explore issues that can inhibit efficiency of security agency operation and collaboration and to identify actions that have enhanced collaboration. Based on theories of organizational development, leadership, and security tradecraft, this study examined the activities related to maintenance of security at a large California seaport. Research questions focused on the types of relationships that exist among supervisors and employees, how these relationships were formed, types of conflicts among organizations, and methods of task allocation among agencies. Individuals who worked for security agencies were randomly selected for participation (n =20). Data gathering was primarily through face-to-face interviews in an open-ended format and augmented by observations of people working within the research environment. An inductive approach to data collection, with open and axial coding, was used to identify themes and patterns. Key findings included themes of trust among seaport security personnel and threats such as smuggling, sabotage, and terrorism. Conclusions and recommendations may help security officials improve the efficiency and effectiveness of security resources. Positive social change may result from enhanced measures that increase security while avoiding threats to commercial activity and individual civil liberties.
APA, Harvard, Vancouver, ISO, and other styles
20

Katete, Christopher Dominic. "Social capital and community-led management of rural water schemes: Evidence from Mulundu Community Managed Water Scheme in Luapula Province of Zambia." University of the Western Cape, 2017. http://hdl.handle.net/11394/6044.

Full text
Abstract:
Magister Artium (Development Studies) - MA (DVS)
The main objective of this study was to assess the contribution of social capital to community-led management of water schemes - using the Mulundu Community Managed Water Scheme in Luapula Province of Zambia - with the view to provide appropriate conclusions and recommendations on how water schemes can more viably be managed. This came in the backdrop of mixed evidence regarding success of community managed water schemes in Zambia and elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
21

Kahari, Ingrid. "An exploratory study of first year residence students' perceptions regarding safety and security at the University of Cape Town." Master's thesis, University of Cape Town, 2010. http://hdl.handle.net/11427/11337.

Full text
Abstract:
Includes abstract.
Includes bibliographical references (leaves 76-82).
Safety and security is an issue that institutions of higher learning have to deal with and address within their campuses. The focus of this study was to explore first year residence students perceptions regarding safety and security at the University of Cape Town (UCT). An exploratory qualitative approach was used in this study. The purposive sample consisted of fourteen first year students from three UCT residences and three residence supervisors from these residences giving a total sample of seventeen participants. The results of the study showed that students see themselves as safer within the confines of UCT whereas they feel relatively unsafe off campus.
APA, Harvard, Vancouver, ISO, and other styles
22

Kamariza, Yvette. "Implementation of information security policies in public organizations : Top management as a success factor." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-37823.

Full text
Abstract:
The purpose of this thesis is to investigate potential success factors related to the implementation of an information security in organizations, with a specific focus on the role of top management in implementing information security policies in organizations. The following are the research questions: What are the factors related to the implementation of an information security in organization according to the literature and what is the organization’s view of these factors? What is the role of the top management in implementing an information security policy in an organization according to the literature and what is the organization’s view of the role? A case study approach was implemented in this study, collecting data from both primary and secondary sources by doing a literature review, and interviews. A document analysis was done as well as a field visit.Based on the literature, the success factors related to the implementation of an information security in organization are: management support, security awareness and training, budget, information security policy enforcement, organization objectives and goals. Based on the interviews, both two organizations agree with those success factors found in the literature. Regarding the role of the top management in implementing an information security policy in organization, the two organizations have different views on that role. For one organization, the successful implementation of an information security policy does not need the involvement of the top management, and for the other one, in order to achieve a successful implementation of an information security policy, there must be involvement of the top management. Suggestions for further researcher are: Future researchers interested in this field may include to conduct a qualitative research in different public organizations, also including private organizations but for a longer period of time, so the researcher can make a comparison of the top management’s role in implementing an information security policy between public and private organizations. The researcher can also try to find other success factors related to the implementation of an information security.
APA, Harvard, Vancouver, ISO, and other styles
23

Gerber, Petro. "Addressing the incremental risks associated with social media by using the cobit 5 control framework." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96665.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will increase competitiveness. However, social media also introduce significant risks to those who adopt it. A business can use existing IT governance control framework to address the risks introduced by social media. However a business should combine existing control frameworks for adequate and complete IT governance. This study was undertaken to help businesses to identify incremental risks resulting from the adoption of social media and to develop an integrated IT governance control framework to address these risks both at strategic and operational level. With the help of the processes in COBIT 5, this study provides safeguards or controls which can be implemented to address the IT risks that social media introduce to a business. By implementing the safeguards and controls identified from COBIT 5, a business ensures that they successfully govern the IT related risks at strategic level. This study also briefly discuss the steps that a business can follow to ensure IT related risks at operational level is addressed through the implementation of configuration controls.
AFRIKAANSE OPSOMMING: Sosiale media bied groot geleenthede vir besighede en die gebruik daarvan sal mededingendheid verhoog. Sosiale media hou ook egter beduidende risiko's in vir diegene wat dit aanneem. 'n Besigheid kan bestaande Informasie Tegnologie (IT) kontrole raamwerke gebruik om die risiko's wat ontstaan as gevolg van die gebruik van sosiale media aan te spreek. Vir voldoende en volledige IT korporatiewe beheer moet 'n besigheid egter bestaande kontrole raamwerke kombineer. Hierdie studie is onderneem om besighede te help om die toenemende risiko's wat ontstaan as gevolg van die gebruik van die sosiale media, te identifiseer en om 'n geïntegreerde IT kontrole raamwerk te ontwikkel om hierdie risiko's op strategiese sowel as operasionele vlak aan te spreek. Met die hulp van die prosesse in COBIT 5 voorsien hierdie studie voorsorgmaatreëls of kontroles wat geïmplementeer kan word om die IT-risiko's waaraan die besigheid, deur middel van sosiale media blootgestel is, aan te spreek. Deur die implementering van die voorsorgmaatreëls en kontroles soos geïdentifiseer uit COBIT 5, verseker ʼn besigheid dat hulle die IT-verwante risiko's op strategiese vlak suksesvol beheer. Hierdie studie bespreek ook kortliks die stappe wat 'n besigheid kan volg om te verseker dat IT-verwante risiko's op operasionele vlak aangespreek word deur die implementering van konfigurasie kontroles.
APA, Harvard, Vancouver, ISO, and other styles
24

Nabo, Vuyokazi. "Implementation of performance management systems at the South African Social Security Agency (SASSA), Nelson Mandela Metro District." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/6412.

Full text
Abstract:
The focus of the study is to investigate the factors that impact on effective implementation of a performance management system at the South African Social Security Agency (SASSA) in the Eastern Cape Region, Nelson Mandela Metro District. It is said that an organisational success in service delivery largely depends on the efficiency and effectiveness of its employees in undertaking their functions, duties and responsibilities (Ntombela, Mpehle and Penciliah, 2010: 63).
APA, Harvard, Vancouver, ISO, and other styles
25

Kraner, Mariah Ann. "Friends or Foes?: Examining Social Capital of International NGOs and Food Security Programs." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1647.

Full text
Abstract:
Food insecurity and chronic hunger are devastating global problems currently facing more than a billion people. There are many actors involved in the response to stomp out world hunger, including International Non-Governmental Organizations (INGOs). These INGOs, however, work in tumultuous environments with limited resources. This dissertation examines the INGOs involved in the food security dilemma (N=51) to investigate how they use resources to reach hungry populations. It is hypothesized INGOs use a mix of material resources and social capital to enhance their organizational performance. However, little is known about the impact these resources have on reaching communities in need. Social network analysis is used to examine the connections between and among INGOs to create a measure of organizational social capital. In addition, material resources, such as human resources, revenue and volunteers are used to examine an organization's material capacity. Material and social resources are examined through a moderated regression analysis to evaluate how they interact, and if the promotion of both types of resources is beneficial to the INGOs and the communities they serve. With data from over 1186 projects globally, results are presented regarding the effectiveness of social capital and material resources in reaching the world's "bottom billion."
APA, Harvard, Vancouver, ISO, and other styles
26

Bell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.

Full text
Abstract:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these “focusing events” (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these “focusing events.” In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996- 2011. It is the pattern of interconnections that occur over time that are the focus of this study. The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters
APA, Harvard, Vancouver, ISO, and other styles
27

Fernandes, Rui Mendes Rodrigues. "O Sistema de Protecção Social de Cabo Verde : Uma análise do Regime de Protecção Social Obrigatória." Master's thesis, Instituto Superior de Economia e Gestão, 2011. http://hdl.handle.net/10400.5/4327.

Full text
Abstract:
Mestrado em Finanças
Neste trabalho propomo-nos descrever o sistema de Protecção Social de Cabo Verde e analisar detalhadamente o regime de Protecção Social Obrigatória, a cargo do Instituto Nacional de Previdência Social. Para tal, numa primeira fase, procedemos à apresentação da arquitectura do sistema, com destaque para o regime de Protecção So-cial Obrigatória. De seguida, e no âmbito dos problemas de sustentabilidade que têm surgido em sistemas de segurança social de outros países, efectuamos uma análise de gestão da carteira constituída com os excedentes deste regime no período 2000-2009. Em síntese, concluímos que a rendibilidade da carteira no período em análise foi elevada e relativamente estável. Quanto ao risco da carteira, embora de difícil apreciação devido à falta de alguma informação relevante, tem-se mantido em níveis adequados à baixa ma¬turidade do sistema de protecção social de Cabo Verde. A avaliação do desempenho da carteira é, portanto, aceitável.
This essay is an attempt to provide a description of Cape Verde's Social Insu-rance system and a detailed analysis of the Compulsory Social Insurance regime under the National Institute for Social Insurance (INPS). In order to do so, we endeavour, firs-tly, to present the structure of the system, with emphasis on the Compulsory Social Insu-rance regime. Secondly, and bearing in mind the sustainability issues that have emerged in other countries' social security systems, we analyze the management of the portfolio built with this regime's surpluses in the 2000-2009 period. In summary, we conclude that the portfolio's profitability in the analyzed period was high and relatively stable. As for the portfolio's risk, although difficult to assess for lack of some relevant information, it has stayed at levels adequate to the low maturity of Cape Verde's social insurance system. The portfolio's performance is therefore deemed acceptable.
APA, Harvard, Vancouver, ISO, and other styles
28

Davids, Emihiyah. "Assessing the e-readiness of the South African Social Security Agency (SASSA) regional office Western Cape and its customers." Thesis, Stellenbosch : University of Stellenbosch, 2011. http://hdl.handle.net/10019.1/6497.

Full text
Abstract:
Thesis (MPA)--University of Stellenbosch, 2011.
ENGLISH ABSTRACT: e-Governance refers to the utilisation of technology to improve on service delivery, sharing of information, client participation as well as to advance government through the transformation of its internal and external relationships (Shilubane, 2001:40).e-Governance further implies that government disseminates information and renders services to the public through “electronic means” (Manohar, Pulapa and Mellam, 2009:243). On the other hand, e-government is not entirely about electronic service delivery, but part of the continuous restructuring of government to ensure participation from its partners for improved efficacy and success. Therefore e-government is participatory in nature when implemented correctly. This study assesses and evaluates the current infrastructure and current e-initiatives of the South African Social Security Agency (SASSA) Regional Office Western Cape and the extent to which the agency and its customers are ready to adopt e-government. The e-Governance Road Map (ERM) developed by Ernst & Young India for the New Delhi government was used to guide the researcher to assess the level of e-readiness of the SASSA Regional Office Western Cape. The Information and Communication Technology manager and customer care manager of the SASSA Regional Office Western Cape were interviewed and the beneficiaries of SASSA were requested to participate in the completion of questionnaires. The study found that the customers of SASSA were not as interested in electronic services as in mobile services such as reminders and notifications through short message service (SMS). There are, however, several impediments at SASSA such as an adoption of e-government and m-government, low budget for information and communication technology (ICT) as well as to conduct research among a larger group of SASSA customers. The study mainly recommends that the SASSA Regional Office Western Cape conduct a research study on a larger scale than this research study and to determine the needs of customers in respect of e-services and m-services. Should the agency decide to conduct an e-readiness assessment, the National e-Government Plan (NeGP) of India could be a useful guideline for the implementation of e-governance. The research study strongly recommends that SASSA develops a capacity-building roadmap for the successful implementation of e-governance.
AFRIKAANSE OPSOMMING: e-Regering verwys na die benutting van tegnologie om te verbeter op dienslewering, die deel van inligting, die kliënte deelname te versterk, sowel as om die regering te bevorder deur die transformasie van interne en eksterne verhoudings (Shilubane,2001:40). e-Regering impliseer verder dat die regering inligting versprei en dienste lewer aan die publiek deur middel van "elektroniese metodes" (Manohar, Pulapa en Mellam, 2009:243). Aan die ander kant, e-regering het nie slegs betrekking tot elektroniese dienslewering nie, maar sluit ook in die deurlopende herstrukturering van die regering om deelname van sy vennote te verseker om doeltreffendheid en sukses te bewerkstellig. e-Regering word dus as deelnemend beskou wanneer dit korrek geïmplementeer word. Hierdie studie bepaal en evalueer die huidige infrastruktuur en e-inisiatiewe van die Suid Afrikaanse Agentskap vir Maatskaplike Sekerheid (SAAMS) Streekkantoor Wes-Kaap en die mate waarin die agentskap en sy kliënte gereed is om e-regering aan te neem. Die e-regering kaart wat ontwikkel is deur Ernst en Young Indië vir die Nieu-Delhi regering was gebruik as riglyn om die vlak van e-gereedheid van die SAAMS Streekkantoor Wes-Kaap te bepaal. Onderhoude was gevoer met die Inligting en Kommunikasie tegnologiebestuurder en die kliëntediensbestuurder van die SAAMS Streekkantoor Wes-Kaap en die begunstigdes van SAAMS was versoek om deel te neem in die voltooiing van vraelyste. Die studie het bevind dat die kliënte van SAAMS nie werklik belangstel in elektroniese dienste nie, maar inteendeel aan mobiele dienste, onder andere kennisgewings deur middel van 'n kort boodskap diens. Daar is egter verskeie hindernisse wat die aanvaarding van e-regering en m-regering bemoeilik soos byvoorbeeld 'n lae begroting vir inligting en kommunikasie tegnologie (IKT) asook om navorsing te doen onder 'n groter groep van SAAMS kliënte. Die studie beveel hoofsaaklik aan dat SAAMS Streekkantoor Wes-Kaap 'n navorsingsprojek doen op 'n groter skaal as hierdie navorsing en die behoeftes van kliënte ten opsigte van e-dienste en m-dienste te bepaal. Indien die agentskap besluit om 'n e-gereedheid assessering uit te voer, word die Nasionale e-Regering Plan (NeGP) van Indië aan beveel as 'n nuttige riglyn vir die implementering van e-regering. Die navorsing beveel sterk aan dat SAAMS 'n vermoë-opbouplan vir die suksesvolle implementering van e-regering ontwikkel.
APA, Harvard, Vancouver, ISO, and other styles
29

Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.

Full text
Abstract:
The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters.  This bachelor’s thesis aims to discover how a IT-company can work with security management within the Internet of Things, this is done by looking into how a IT-company can work with updating, monitoring and responding within the Internet of Things, as well what challenges there are with working with this.  A qualitative research approach was used for this case study along with an interpretative perspective, as well as abductive reasoning. Interviews were performed with employees of a large IT-company based in Sweden, along with extensive document analysis.  Our bachelor’s thesis results in challenges with Security Management within the areas updating, monitoring and responding along with how our Case Company works with these security challenges. Largely these challenges can be summarized that everything is harder with the number of devices there are within the Internet of Things
Internet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera.  En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys.  Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
30

Twisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.

Full text
Abstract:
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner's knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention.
APA, Harvard, Vancouver, ISO, and other styles
31

Srinivas, Preethi. "Private Key Allocation based Access Control Scheme for Social Networks." Miami University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=miami1281839737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Carpes, Nívea S. "De porto a porto : a segurança pública como forma de controle social." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/180947.

Full text
Abstract:
A tese analisa a atuação dos secretários de segurança e sua capacidade de gerar mudanças nas instituições de segurança e sobre os índices de criminalidade e violência. O objeto de investigação circunscreve-se ao âmbito do estado do Rio Grande do Sul, na cidade de Porto Alegre, nas gestões da segurança pública do período entre 2001 a 2015. O enfoque é a política de segurança proposta pelos secretários de segurança e os dados criminais da cidade de Porto Alegre, que possibilitam um diálogo com a política criminal portuguesa e programas especiais de segurança pública, executados pela Polícia de Segurança Pública. Para esse cenário, a tese busca apresentar o contexto histórico, social e econômico que favorece a criminalidade em Porto Alegre e na cidade do Porto, fazendo um debate com elementos como planos de segurança, modelos de policiamento, índices criminais, a política criminal portuguesa, a lei que descriminaliza o consumo de drogas em Portugal e os programas especiais da Polícia de Segurança Pública do Porto. Em termos metodológicos, foram realizadas análises de documentos; foram levantados dados sobre criminalidade, reaparelhamento das instituições de segurança, investimento em formação, novas tecnologias e participação social; e foram realizadas entrevistas. O referencial teórico foi constituído por abordagens sobre segurança pública e dilemas da violência e da criminalidade – Benevides (1985), Soares (2003), Adorno (1996), Velho (2000), Silva (1999); “governance” - Wood & Dupont, 2006, Oliveira (2006), Merrien (1998), Johnston & Shearing (2003), Agra (1997), Oliveira (2006), Zedner (2009), Lemieux (2000), Webber (2004) e Jones (2012); e cidadania - Villagómez (1997), Elster (1993), Martin & Ceballos (2004), Sen (2003), Dagnino (2004) e Carvalho (2001). Para desenvolver esta análise, vinculamos o contexto da segurança pública a temas fundamentais como a “governance”, que nos possibilita tomar contato com a gestão a partir de um debate específico e a cidadania, como elemento que imprime um novo ponto de partida para a segurança pública. Pudemos constatar que a segurança pública no Brasil chega de maneira diferente aos estratos sociais. De modo geral, utilizando recursos diversos, os secretários de segurança buscaram dar respostas que definiam um determinado tipo de controle sobre a criminalidade e a violência, os resultados são expostos nos índices de criminalidade. Os enfoques para confrontar a insegurança vão do combate à criminalidade até o enfrentamento da causalidade do crime. A visão sobre o criminoso tem grande diferença, alguns secretários evitam esse ângulo, alguns compreendem que são cidadãos que deveriam ter oportunidades e outros entendem como pessoas irremediavelmente desviantes. Assim, os secretários dividemse entre mais voltados para uma abordagem social-crítica do contexto de criminalidade, os que ficam num estágio intermediário, conservador, buscando ações preventivas e aqueles que se concentram numa perspectiva punitivista e tradicional do combate ao crime. Quanto à Portugal, vem para essa tese para confirmar as possibilidades de uma convivência social pacífica, a despeito da existência de problemas socioeconômicos, destacando elementos culturais importantes na construção de ambientes seguros. Por fim, a Polícia de Segurança Pública demonstra a importância de programas especiais de segurança perenes e bem definidos, voltados a públicos mais vulneráveis.
The thesis analyzes the performance of the secretaries of security and their capacity to generate changes in the security institutions and on the rates of crime and violence. The object of investigation is limited to the scope of the state of Rio Grande do Sul, in the city of Porto Alegre, in the public security administrations of the period between 2001 and 2015. The focus is the security policy proposed by the secretaries of security and the data criminal cases of the city of Porto Alegre, that allow a dialogue with the Portuguese criminal policy and special programs of public security, executed by the Public Security Police. For this scenario, the thesis seeks to present the historical, social and economic context that favors criminality in Porto Alegre and in the city of Porto, by discussing elements such as security plans, policing models, criminal indexes, Portuguese criminal policy, law that decriminalizes drug use in Portugal and the special programs of the Porto Public Security Police. In methodological terms, document analyzes were carried out; data were collected on crime, re-organization of security institutions, investment in training, new technologies and social participation; and interviews were conducted. The theoretical framework was constituted by approaches on public security and dilemmas of violence and crime - Benevides (1985), Soares (2003), Adorno (1996), Velho (2000), Silva (1999); (1998), Johnston & Shearing (2003), Agra (1997), Oliveira (2006), Zedner (2009), Lemieux (2000), Webber (2004) and Jones (2012); and citizenship - Villagómez (1997), Elster (1993), Martin & Ceballos (2004), Sen (2003), Dagnino (2004) and Carvalho (2001) In order to develop this analysis, we link the public security context to fundamental issues such as "governance", which enables us to make contact with management through a specific debate and citizenship as an element that sets a new starting point for security public. We can see that public security in Brazil arrives differently from social strata. In general, using diverse resources, the secretaries of security sought to provide answers that defined a certain type of control over crime and violence, the results are exposed in crime rates. The approaches to confront insecurity range from combating crime to tackling the causality of crime. The view of the criminal has a big difference, some secretaries avoid this angle, some understand that they are citizens who should have opportunities and others understand them as hopelessly deviant people. Thus, the secretaries are divided among more focused on a social-critical approach to the context of crime, those who are in an intermediate stage, conservative, seeking preventive actions and those who focus on a punitive and traditional perspective of the fight against crime. As for Portugal, he comes to this thesis to confirm the possibilities of a peaceful social coexistence, in spite of the existence of socioeconomic problems, highlighting important cultural elements in the construction of safe environments. Finally, the Public Security Police demonstrates the importance of special, perennial, well-defined security programs aimed at more vulnerable groups.
APA, Harvard, Vancouver, ISO, and other styles
33

Nordeman, Anna-Therese. "Constant and instant notifications - youth experiences of online security, relations and information in La Paz/El Alto." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21329.

Full text
Abstract:
Several studies explore new technology and social media usage, especially in the global North. This study set out to investigate what kind of experiences and opinions youth in La Paz and El Alto, Bolivia, had of their internet and communication technology usage, through semi-structural interviews, at the same time comparing the possible differences in this between LGBT and non-LGBT youth. That way I am trying to add a perspective and voice in the new media discourse, as well as adding to the knowledge of my partner organization, Svalorna Latinamerika. I decided to focus on three main online activities; security issues, relationship building and information management, and the nine informants were encouraged to share their thoughts and experiences as well as information about their general ICT usage. The results showed that the youth’s internet usage was depending more on their interest in the different media and platforms, rather than on their sexual orientation or gender. The LGBT informants however had more experiences of discrimination and threat online. Also, all of the informant’s seemed to create new relations not only to other users online, but also to the platforms and media itself, this depending on how much they were using the platforms. Finally I could see that the informants could satisfy many different needs with their ICT and social media use, depending on their interests, resources and time spent online.
APA, Harvard, Vancouver, ISO, and other styles
34

Vasconcelos, Junior Jorge Og de. "Instituto Nacional de Seguro Social (INSS) : uma an?lise da "moderniza??o" da previd?ncia social brasileira." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2017. http://tede2.pucrs.br/tede2/handle/tede/7597.

Full text
Abstract:
Submitted by PPG Servi?o Social (servico-social-pg@pucrs.br) on 2017-07-31T13:02:29Z No. of bitstreams: 1 Disserta??o - Jorge Og de Vasconcelos Junior.pdf: 1425968 bytes, checksum: a9cfc5be92fffb8b05008d4abfa3d33b (MD5)
Approved for entry into archive by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-07-31T13:28:20Z (GMT) No. of bitstreams: 1 Disserta??o - Jorge Og de Vasconcelos Junior.pdf: 1425968 bytes, checksum: a9cfc5be92fffb8b05008d4abfa3d33b (MD5)
Made available in DSpace on 2017-07-31T13:34:24Z (GMT). No. of bitstreams: 1 Disserta??o - Jorge Og de Vasconcelos Junior.pdf: 1425968 bytes, checksum: a9cfc5be92fffb8b05008d4abfa3d33b (MD5) Previous issue date: 2017-05-31
Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior - CAPES
This dissertation is about the "modernization" initiatives of Brazilian social security, even before its institutionalization in the 1920s until the New Model of Management Project (PNMG) of 2002. Thus, it was aimed to analyze the repercussions that the project of "Modernization" of the 2002 INSS management brought to the work processes and recognition of social rights in the Institution with a view to providing the subsidies for future studies and reform actions of the current model. The research was guided by the method of historical and dialectical materialist investigation and exposition because it understood that it allows to unveil the real in its most diverse contradictions. Based on the use of the mixed approach, to analyze the information collected and from the bibliographic review and documentary analysis, the content analysis technique was used (BARDIN, 2009), organized around three stages: pre-analysis, The exploitation of the material and the treatment of results. Thus, the results show that until its institutionalization, politics was managed exclusively by its workers and constituted the first forms of class organization in Brazil. With the later co-participation of the State and the gradual minimization of workers' participation in the management of Brazilian social security, managerial problems intensified, taking this social policy to the abyss of bureaucracy that is still up to date. Since the 1920s, dozens of initiatives have been the conservative modernization of the social security system, but all of them are very similar in their superficiality to the emergency solutions found for such structural problems. Therefore, it is concluded that it is still possible to advance in effective management reforms in the INSS, as in the points referring to the greater participation of the users of the policy in the social control and planning of the same, reversing the jump in the number of complaints accumulated in the Ombudsman's Office that is Revealing the tensions in the user x INSS relation; In the rationalization of the occupation of management positions; And the (re) structuring of the Social Security Career. Finally, the expectation is that this study contributes to the debate of this important and fundamental issue that conflicts with Brazilian society.
A presente disserta??o versa sobre as iniciativas de ?moderniza??o? da previd?ncia social brasileira, antes mesmo de sua institucionaliza??o, nos anos 1920, at? o Projeto do Novo Modelo de Gest?o (PNMG) de 2002. Assim, objetivouse analisar quais as repercuss?es que o projeto de ?moderniza??o? da gest?o do INSS de 2002 trouxe aos processos de trabalho e ao reconhecimento dos direitos sociais na institui??o com vistas a fornecer os subs?dios para futuros estudos e a??es de reforma do atual modelo. A pesquisa orientou-se pelo m?todo de investiga??o e exposi??o materialista hist?rico e dial?tico por entender que ele possibilita desvendar o real em suas mais diversas contradi??es. Com base na utiliza??o do enfoque misto, para a an?lise das informa??es coletadas e a partir da revis?o bibliogr?fica e an?lise documental, utilizou-se da t?cnica de an?lise de conte?do (BARDIN, 2009), organizada em torno de tr?s etapas: a pr?-an?lise, a explora??o do material e o tratamento dos resultados. Desse modo, os resultados apontam que at? a sua institucionaliza??o, a pol?tica foi gerida exclusivamente pelos seus trabalhadores e se constituiu nas primeiras formas de organiza??o classistas no Brasil. Com a posterior coparticipa??o do Estado e a gradativa minimiza??o da participa??o dos trabalhadores na gest?o da previd?ncia social brasileira, intensificaram-se os problemas gerenciais, levando essa pol?tica social ao abismo do burocratismo que se encontra at? a atualidade. Desse feito, desde os anos 1920, dezenas foram as iniciativas de moderniza??o conservadora do sistema previdenci?rio. No entanto, todas elas muito similares em sua superficialidade quanto ?s solu??es emergenciais encontradas para tais problemas estruturais. Portanto, conclui-se que ainda ? poss?vel avan?ar em efetivas reformas gerenciais no INSS, como nos pontos referentes ? maior participa??o dos usu?rios da pol?tica no controle social e planejamento da mesma, revertendo o salto no n?mero de reclama??es acumuladas na Ouvidoria do Instituto, que ? reveladora das tens?es na rela??o usu?rio x INSS; na racionaliza??o da ocupa??o de cargos de gest?o; e na (re) estrutura??o da Carreira do Seguro Social. Por fim, a expectativa ? que este estudo contribua para o debate deste importante e fundamental tema que conflita a sociedade brasileira.
APA, Harvard, Vancouver, ISO, and other styles
35

Alakpa, George Edafese U. "Perceptions of military personnel| Analysis of the Department of Defense?s counter bioterrorism measures at the tactical level for the enhacement of civil security, leadership, management, and policy." Thesis, New Jersey City University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3730740.

Full text
Abstract:

The Department of Defense, at the time of this study, had over 38 combat Forward Operating Bases (FOB) with both U.S. military and non-military personnel residing and engaged in the mission. Also in these FOBs, are local nationals of the countries, who are employed to perform certain duties in these FOBs after having had certain security and medical background checks. However, while on military mission in Afghanistan and other Middle Eastern countries between 2009 and 2011, this researcher, observed and detected more than once, local nationals (LNs), Afghans, with certain infectious skin conditions working in the DIFACs (dining facilities) at major FOBs, serving food to soldiers inside the base. These LNs reside outside the FOB facility and gain entrance into the FOB daily, passing through already set security parameters put in place by the Department of Defense (DoD). There are Tactics, Techniques, and Procedures (TTP) to prevent or mitigate Person-borne Improvised Explosive Device (PBIED), Vehicle-borne Improvised Explosive Device (VBIED), and to also respond to, or recover from, Chemical, Biological, Radioactive, and Nuclear (CBRN) attacks on FOBs. Researcher is unaware of any TTP specific for HB-BA terrorist, capable of detecting, deterring or destroying a terrorist with bioagents breaching a combat post ECP; nor the training of soldiers of how to conduct a search on a bio-agent (BA) – or even what a bio-agent would look like if they found one. The purpose of this research was to determine whether there are current military counter bioterrorism measures in place to combat a human-borne with a bioagent (HB-BA) terrorist attempting to breach a combat FOB at the ECP, and how effective they are.

To accomplish this, a survey tool had to be developed and employed to determine the perceptions about the effectiveness of current ECP TTPs in detecting, deterring preventing, and mitigating a HBBA terrorist at the ECP, from military personnel. A survey tool (questionnaire) was developed, validated, and subjected to a reliability testing using Cronbach’s Alpha on a mix-method cross sectional survey, a pretest. Results showed a Cronbach’s Alpha of 0.82 and 0.89 for the survey’s two constructs. Also, 92.3% of respondents had recently been in combat deployment. All of them claimed that bioterrorism is very possible, but 61.5% believe it is either very possible or possible for a terrorist with a bioagent (BA) to successfully breach a FOB ECP. Only 3.8% felt that it would be impossible to breach the FOB ECP with a bioagent. Similarly, only 28% of respondents surveyed believe that current ECP TTPs are effective against a BA, 48% believe that current CBRN TTPs are either not effective, or somewhat effective, against BA at the ECP. In conclusion, the preliminary study, indicated that combat FOBs are vulnerable to breach by human-borne with BA terrorist at the ECP, as there exists no currently effective ECP TTP that could detect, deter or destroy a terrorist with a biological agent at a combat FOB ECP.

APA, Harvard, Vancouver, ISO, and other styles
36

Gonzalez, Granadillo Gustavo Daniel. "Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939091.

Full text
Abstract:
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operating centers. They gather events from various sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views for threat handling and security reporting. Research in SIEM technologies has traditionally focused on providing a comprehensive interpretation of threats, in particular to evaluate their importance and prioritize responses accordingly. However, in many cases, threat responses still require humans to carry out the analysis and decision tasks e.g., understanding the threats, defining the appropriate countermeasures and deploying them. This is a slow and costly process, requiring a high level of expertise, and remaining error-prone nonetheless. Thus, recent research in SIEM technology has focused on the ability to automate the process of selecting and deploying countermeasures. Several authors have proposed automatic response mechanisms, such as the adaptation of security policies, to overcome the limitations of static or manual response. Although these approaches improve the reaction process (making it faster and/or more efficient), they remain limited since these solutions do not analyze the impact of the countermeasures selected to mitigate the attacks. In this thesis, we propose a novel and systematic process to select the optimal countermeasure from a pool of candidates, by ranking them based on a trade-off between their efficiency in stopping the attack and their ability to preserve, at the same time, the best service to normal users. In addition, we propose a model to represent graphically attacks and countermeasures, so as to determine the volume of each element in a scenario of multiple attacks. The coordinates of each element are derived from a URI. This latter is mainly composed of three axes: user, channel, and resource. We use the CARVER methodology to give an appropriate weight to each element composing the axes in our coordinate system. This approach allows us to connect the volumes with the risks (i.e. big volumes are equivalent to high risk, whereas small volumes are equivalent to low risk). Two concepts are considered while comparing two or more risk volumes: Residual risk, which results when the risk volume is higher than the countermeasure volume; and Collateral damage, which results when the countermeasure volume is higher than the risk volume. As a result, we are able to evaluate countermeasures for single and multiple attack scenarios, making it possible to select the countermeasure or group of countermeasures that provides the highest benefit to the organization
APA, Harvard, Vancouver, ISO, and other styles
37

Lundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.

Full text
Abstract:
In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. The purpose of this research is to explore the field of Dynamic Risk Management in Information Security from a socio-technical perspective in order to mitigate both types of threats faster and dynamically to better suit the connected world we live in today. In this study, the Design Science Research methodology was utilized to create a Dynamic Information Security Risk Management model based on functionality requirements collected through interviews with professionals in the financial sector and structured literature studies. Finally, the constructed dynamic model was then evaluated in terms of its functionality and usability. The results of the evaluation showed that the finalized dynamic risk management model has great potential to mitigate both social and technical cyber threats in a dynamic fashion.
Under senaste decenniet har en ny våg av sociotekniska cyberhot uppkommit som är riktade både mot de sociala och tekniska sårbarheterna hos organisationer. Dessa hot kräver snabba och effektiva hotreduceringar, dock är det fortfarande vanligt att finansiella organisationer förlitar sig på årligen granskade riskhanteringsmetoder som både är långsamma och statiska för att mildra de ständigt föränderliga cyberhoten. Syftet med denna forskning är att undersöka området för dynamisk riskhantering inom informationssäkerhet ur ett sociotekniskt perspektiv, med målsättningen att snabbare och dynamiskt kunna mildra bägge typerna av hot för att bättre passa dagens uppkopplade värld.  I studien användes Design Science Research för att skapa en dynamisk riskhanteringsmodell med syfte att hantera sociotekniska cyberhot mot informationssäkerheten. Riskhanteringsmodellen är baserad på funktionskrav insamlade genom intervjuer med yrkesverksamma inom finanssektorn, samt strukturerade litteraturstudier.  Avslutningsvis utvärderades den konstruerade dynamiska modellen avseende dess funktionalitet och användbarhet. Resultaten av utvärderingen påvisade att den slutgiltiga dynamiska riskhanteringsmodellen har en stor potential att mitigera både sociala och tekniska cyberhot på ett dynamiskt sätt.
APA, Harvard, Vancouver, ISO, and other styles
38

Kociara, Magdalena. "The Europeanization of security identity : The comparison case study of the Swedish and Finnish non-alignment policies." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104202.

Full text
Abstract:
The aim of this thesis is to analyse the sppecific meaning of non- alignment policies of Sweden and Finland after joining the EU in 1995. In doing so, the research design is based on sociological institutionalism and its key concepts and phases that are connected to the study of Europeanization. Thereby, the study compares the domestic policies of national identity and its changes in Sweden and Finland before and after the accession to the EU. This shall answer the reserach question on how far the foreign policies of Sweden and Finland have been Europeanized and whether or not non- alignment policies are an obstacle in this process. Since social constructivism considers Europeanization as a socialization process, the paper will also investigate the main challenges for Sweden and Finalnd to face with reagrd to crisis managment, territorial defence issue and Crimea Crisis.
APA, Harvard, Vancouver, ISO, and other styles
39

Holmström, Anton. "Applying information security to the operational technology environment and the challenges it brings." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85353.

Full text
Abstract:
Information security risks in the operational technology (OT) environment is becoming legitimate challenges for businesses pursing an industrial digitalisation. IT and OT di˙erences reach across managerial, technical and operational aspects, creating unique challenges in developing a suÿcient security posture. The goal of the study is to gain an understanding of the challenges businesses face when applying information security in the operational technology environment in the context of an increased connectivity to the IT environment. In order to understand how information security is adapted to an OT environment, semi-structured interviews was conducted with respondents working with information security in process and production industries. These findings suggest that businesses tends to view the interconnection of IT and OT as two separate environments rather than one shared, which is causing managerial challenges when adapting an information security strategy to cover both the IT and the OT aspect of an organisation.
APA, Harvard, Vancouver, ISO, and other styles
40

Rust, Sunchlar M. "Collaborative network evolution the Los Angeles terrorism early warning group." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FRust.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Connolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.

Full text
Abstract:
Yes
Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management.
This work was supported by the Engineering and Physical Sciences Research Council and is part of the EMPHASIS (EconoMical, PsycHologicAl and Societal Impact of RanSomware) project [EP/P011721/1].
APA, Harvard, Vancouver, ISO, and other styles
42

Silva, Gisele Crisóstomo Paiva da. "Reforma do Regime Previdenciário dos Servidores Públicos: Análise dos Avanços e Recuos." Pontifícia Universidade Católica de Goiás, 2011. http://localhost:8080/tede/handle/tede/2157.

Full text
Abstract:
Made available in DSpace on 2016-08-10T10:32:04Z (GMT). No. of bitstreams: 1 Gisele Crisostomo Paiva da Silva.pdf: 948356 bytes, checksum: 75f6b4bfe4911255ed9aef7574ce4d5f (MD5) Previous issue date: 2011-12-09
The paper's main objective is to analyze the social security reform for civil servants, which are governed by their own pension arrangements. The study is descriptive and bibliographic and aims to show the changes caused by welfare reform, made from the enactment of Constitutional Amendment No. 20, 1998, and the remaining: Amendments 41, and 47, 2003, 2005, in the life of civil servants of the Union. A major challenge facing pension schemes, whether public or private, is without a doubt, the past and manage the transition to the new reality. When it come to the past, there is nothing to be done except keeping the attention and responsible management; and as for the transition, the alternative to speed it up by including in the current server still remains and is already provided in the supplementary pension reform We conclude that the implementation of pension reform in Brazil, due to the growth of the economy and the changing age structure of population, becomes a necessary measure. The demographic dividend, handled properly will bring high socio-economic benefits to society.
A dissertação tem como objetivo, analisar a reforma da previdência social para os servidores públicos, os quais são regidos pelo regime próprio de previdência. O estudo é descritivo, e bibliográfico e pretende mostrar as modificações provocadas pela reforma da previdência, efetuadas a partir da promulgação da Emenda Constitucional nº 20, de 1998, e, as demais: Emendas 41, de 2003 e 47, de 2005, na vida do servidor público civil da União. Um grande desafio que se impõe aos regimes previdenciários, seja público ou privado, é, sem dúvida, administrar o passado e a transição para a nova realidade. Com relação ao passado não há o que fazer, salvo manter a atenção e a gerência responsável, e, quanto à transição, resta a alternativa de acelerá-la, mediante a inclusão dos atuais servidores no regime complementar já previsto na Reforma da Previdência. Concluímos que a realização da reforma da previdência no Brasil, em função do crescimento da economia e da mudança na estrutura etária da população, torna-se uma medida necessária. O dividendo demográfico, caso aproveitado de forma adequada, trará elevados benefícios socioeconômicos para a sociedade.
APA, Harvard, Vancouver, ISO, and other styles
43

Rood, Jason Alexander. "Public Participation in Emergency Management." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/333.

Full text
Abstract:
With disasters increasing in frequency and costs each year, this study seeks to explore ways greater public participation can assist emergency managers in their mission to keep communities safe. Specifically this study examines the policy process and administrative functions of emergency management to illuminated the benefits and hindrances involved in greater participation. This study conducted a qualitative analysis of governmental documents, disaster case studies, international research, as well as political science and administrative doctrines, to arrive at its conclusions. The results of this study reveal that the public is a largely untapped resource in the emergency management field. Engaging the public dialogically in early policy stages and emergency management phases is essential to successful inclusion for both administrators and communities. Specifically, public inclusion creates expanded knowledge, shared learning, personal responsibility, and increased social capital. Faced with the growing threat from disasters, emergency management can create communities that are both more resilient and sustainable by increasing public participation.
APA, Harvard, Vancouver, ISO, and other styles
44

Mouratidis, Haralambos. "A security oriented approach in the development of multiagent systems : applied to the management of the health and social care needs of older people in England." Thesis, University of Sheffield, 2004. http://etheses.whiterose.ac.uk/14864/.

Full text
Abstract:
Security can play an important role in the development of some multi agent systems. However, a careful analysis of software development processes indicates that the definition of security requirements is, usually, considered after the design of the system. This approach, usually, leads to problems, such as conflicts between security and functional requirements, which can translate into security vulnerabilities. As a result, the integration of security issues in agent oriented software engineering methodologies has been identified as an important issue. Nevertheless, developers of agent oriented software engineering methodologies have mainly neglected security engineering and in fact very little evidence has been reported on work that integrates security issues into the development stages of agent oriented software engineering methodologies. This thesis advances the current state of the art In agent oriented software engineering in many ways. It identifies problems associated with the integration of security and software engineering and proposes a set of minimum requirements that a security oriented process should demonstrate. It extends the concepts and the development process of the Tropos methodology with respect to security to allow developers, even those with minimum security knowledge, to identify desired security requirements for their multi agent systems, reason about them, and as a result develop a system that satisfies its security requirements. In doing so, this research has developed (1) an analysis technique to enable developers to select amongst alternative architectural styles using as criteria the security requirements of the system, (2) a pattern language consisting of security patterns for multi agent systems, and (3) a scenario-based technique that allows developers to test the reaction of the system to potential attacks. The applicability of the approach is demonstrated by employing it in the development of the electronic single assessment process (eSAP) system, a real-life case study that provided the initial motivation for this research.
APA, Harvard, Vancouver, ISO, and other styles
45

Drira, Wassim. "Secure collection and data management system for WSNs." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00814664.

Full text
Abstract:
Nowadays, each user or organization is already connected to a large number of sensor nodes which generate a substantial amount of data, making their management not an obvious issue. In addition, these data can be confidential. For these reasons, developing a secure system managing the data from heterogeneous sensor nodes is a real need. In the first part, we developed a composite-based middleware for wireless sensor networks to communicate with the physical sensors for storing, processing, indexing, analyzing and generating alerts on those sensors data. Each composite is connected to a physical node or used to aggregate data from different composites. Each physical node communicating with the middleware is setup as a composite. The middleware has been used in the context of the European project Mobesens in order to manage data from a sensor network for monitoring water quality. In the second part of the thesis, we proposed a new hybrid authentication and key establishment scheme between senor nodes (SN), gateways (MN) and the middleware (SS). It is based on two protocols. The first protocol intent is the mutual authentication between SS and MN, on providing an asymmetric pair of keys for MN, and on establishing a pairwise key between them. The second protocol aims at authenticating them, and establishing a group key and pairwise keys between SN and the two others. The middleware has been generalized in the third part in order to provide a private space for multi-organization or -user to manage his sensors data using cloud computing. Next, we expanded the composite with gadgets to share securely sensor data in order to provide a secure social sensor network
APA, Harvard, Vancouver, ISO, and other styles
46

Marques, Carlos Gustavo Moimaz. "Participação social e conselhos gestores à luz do princípio da gestão participativa na seguridade social." Universidade Presbiteriana Mackenzie, 2015. http://tede.mackenzie.br/jspui/handle/tede/1300.

Full text
Abstract:
Made available in DSpace on 2016-03-15T19:35:27Z (GMT). No. of bitstreams: 1 Carlos Gustavo Moimaz Marques.pdf: 1718501 bytes, checksum: 9e56579ec707e253be0b881a48375a68 (MD5) Previous issue date: 2015-12-08
The present study aims to analyze how the principle of social participatory in management of Social Security, established in article 194, sole paragraph, VII, of the Brazilian Federal Constitution delimits the perform of the councils of Social Security, especially, if such organs can be used as instruments of social participation in the construction and definition of a public policy. Beginning with the definition of the principle of participatory management in Social Security, the research analyses the national council s managers of Social Security, their experiences and the critics presented by scholars related to the low effectiveness of these organs. The discussion involving the miserableness criterion to obtaining the assistance benefit is presented as an example to demonstrate the little interference from management councils in shaping public policy on social assistance and the legislative deficit in giving, to councils, power to define public policy. Grounded in the constitutional structure which fixed the political and administrative competency, it introduces the real nature of the management councils and the limits fixed for the infra-constitutional legislation. From these limits, the political-administrative premises that guide the principle of social participation in the management of Social Security are established, either with regard to its functions (limits of political powers), either with respect to their own organic structure. Finally, drawing on the comparative analysis of the Spanish Social Security system, it shows up the incompleteness of the Brazilian system, in which, with the excuse of giving broad powers to the management councils, eliminates, in fact, the real social participation management.
O presente trabalho busca analisar como o princípio da gestão participativa na seguridade social, estabelecido no artigo 194, § único, inciso VII, da Constituição Federal, delimita a atuação dos conselhos gestores na seguridade, em especial, se tais órgãos podem ser empregados como instrumentos em que a sociedade participa na construção e definição de políticas públicas de estruturação do sistema. Partindo-se da definição do princípio da gestão participativa na seguridade social, inicia-se a investigação analisando os conselhos gestores nacionais de seguridade social, suas experiências e a crítica que a doutrina nacional apresenta ao apontar a baixa efetividade desses órgãos. A discussão envolvendo a fixação da miserabilidade para fins de obtenção do benefício assistencial de prestação continuada é apresentada como exemplo para demonstrar a pouca interferência dos conselhos gestores na formatação da política pública de assistência social e o déficit legislativo em dar, aos conselhos de forma geral, poderes deliberativos para atuarem na definição de políticas públicas. Alicerçado na estruturação constitucional das competências político-administrativas entre os Poderes, são apresentadas a natureza orgânica dos conselhos gestores e os limites pelos quais passa a legislação infraconstitucional que os estrutura. A partir daí estabelece-se as premissas político-administrativas que norteiam o princípio da gestão participativa na seguridade social, seja no que diz respeito ao seu feixe de atribuições (limites de atribuições - poderes políticos), seja no que diz respeito à própria estruturação orgânica. Por fim, valendo-se da análise comparada do sistema de seguridade social espanhol, demonstra-se a incompletude do sistema brasileiro, que, a pretexto de conferir poderes amplos aos conselhos gestores, acaba ceifando, na realidade, a própria gestão participativa extraída constitucionalmente do princípio da gestão participativa.
APA, Harvard, Vancouver, ISO, and other styles
47

Elamidi, Sokaina, and Taher Dalia Amir. "Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden." Thesis, Mälardalens högskola, Akademin för ekonomi, samhälle och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-40285.

Full text
Abstract:
There are several aspects which need to be considered while planning a building to achieve sustainable environment for people's well-being. One of the significant aspects is social sustainability which is largely about promoting everyone regardless of the circumstances. In a socially sustainable city, there should be access to meeting places to improve social life. The Park Paradiset and the Broparken in Vallastaden were designed to improve socializing between people. The parks in this work are examined based on social aspects; interaction and identity. In addition, a park should be designed based on different aspects to suit different people. This work considers aspects such as recreation/ leisure, cultural identity, accessibility and safety. Beyond these aspects, the stormwater management in the parks is also studied. These studies were conducted with systematic literature studies, site visits, survey and qualitative interviews. A site visit was in Vallastaden, where the authors explored the district and handed out survey to the resident. The interview for the Park Paradise was conducted with Ulrika Gunnman from White Arkitekter and the interview for the Broparken was conducted with Lina Moström from 02landskap. The result shows that the architects worked differently to achieve the social aspects. It can be concluded that Park Paradiset fulfills the aspects better than the Broparken based on survey results, site visits and the interviews. The results further show that the stormwater management for the parks consists of open systems. Open systems have even been current in the Park Paradiset. The open ditches in the park leads the water in the transverse dikes to a longitudinal dike. It can be concluded that the architects utilized stormwater management better in Broparken compared to the Park Paradiset, when the architects transformed the ordinary ditch into something attractive and gave the park a character.
APA, Harvard, Vancouver, ISO, and other styles
48

Domeneghetti, Valdir. "Gestão financeira de fundos de pensão." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/96/96132/tde-27072009-132825/.

Full text
Abstract:
O Sistema Previdenciário Brasileiro é composto por três regimes: o Geral de Previdência Social (RGPS), o Próprio de Previdência do Servidor (RPPS) e o de Previdência Complementar (RPC), operado por entidades abertas e fechadas (EAPC e EFPC). O foco deste estudo é a gestão financeira das Entidades Fechadas de Previdência Complementar (EFPC) reconhecidas no mercado pela denominação de Fundos de Pensão. Durante o processo de pesquisa e coleta de informações para este estudo, tanto em bases de dados de trabalhos científicos nacionais, quanto em internacionais, além da literatura sobre previdência complementar; verificou-se a inexistência de uma abordagem conjunta dos assuntos relevantes para a gestão financeira de Fundos de Pensão. Tais trabalhos e livros abordavam a previdência complementar fechada sob o enfoque legal, contábil, atuarial, sócio-ambiental, da alocação de ativos de investimentos, de governança corporativa; porém de forma individualizada ou reunindo no máximo dois tópicos, nenhum consolidando todos os assuntos. Diante dessa lacuna na literatura/trabalhos científicos e: por ser o Sistema de Previdência Complementar Fechado um dos futuros provedores de recursos de longo prazo para o processo de desenvolvimento do Brasil (como ocorre em outros países); estar em fase de crescimento com o advento da previdência associativa (novos instituidores) e possuir reservas garantidoras de ativos de investimentos de R$ 480,3 bilhões (junho/2008) as quais garantem pagamento de benefícios e pensões a 6,3 milhões (junho/2008) de participantes/assistidos; optou-se pelo desenvolvimento de um estudo que estruturasse todas as questões relevantes para uma eficiente e eficaz gestão financeira de Fundos de Pensão.Os assuntos foram desenvolvidos em dez capítulos, abordando os principais aspectos para proporcionar uma visão sistêmica da gestão financeira dos Fundos de Pensão. Destacam-se os temas: sistema previdenciário no Brasil e em outros países; sistemas de regulamentação e controle; governança corporativa e a gestão de risco; práticas de sustentabilidade financeira; descreve a política de investimentos e a gestão financeira da tesouraria; gestão de investimentos de curto e longo prazo nos Fundos de Pensão e acompanhamento das empresas participadas; práticas contábeis exclusivas; aspectos tributários da gestão financeira dos Fundos de Pensão e empresas participadas; teorias de auxílio da gestão financeira; e, suporte tecnológico para a gestão financeira e operacional.
The Brazilian Pension System is composed of three regimens: the General Social Security System (RGPS), the Proper Security System of the Civil Servant (RPPS) and the Supplementary Security System (RPC), operated by open and closed security entities (EFPC and EAPC). The focus of this study is the Financial Management of Closed Entities of Supplementary Security (EFPC) known for the market name of Pension Funds. During the process of research and collecting of information for this study, both in the databases of national and international papers, we noticed that, in the literature available on supplementary pension, there was the lack of a joint approach on the relevant issues to Financial Management of Pension Funds. The existent works and books address Closed Supplementary Social Security under the focus of Law, Accounting, Actuary, Social Environment, Allocation of Assets of Investments, Corporate Governance, but each one, individually, or at most two topics together, never consolidating all these subjects. Face this gap in the literature / scientific papers, and as the Closed Supplementary Pension System is one of the future providers of long term resources for the development process in Brazil (as in other countries), and as Brazil is in phase of growth with the advent of the Security Associations (new providers) and as Brazil owns guarantor reserves of investment assets of R$ 480,3 billion (June/2008) which guarantee the payment of benefits and pensions to 6,3 million (June/2008) participants / beneficiaries, we decided for a structural study that could address all the relevant issues to an efficient and effective Financial Management of Pension Funds. The issues were developed in ten chapters, covering the main aspects, in order to provide a systemic view of the Financial Management of Pension Funds. We highlight the following topics: the pension system in Brazil and other countries; regulation and control systems; corporate governance and risk management; financial sustainability practices; treasury financial management and investment policies; management of short and long term investments in Pension Funds and monitoring of holdings; unique accounting practices; tax aspects of financial management of Pension Funds and holdings; theories of financial management aid; and technological support to the financial and operational management.
APA, Harvard, Vancouver, ISO, and other styles
49

Sevinc, Tugba. "The Eu As A Security Actor In The Post-cold War Era: A Civilian And/or Military (strategic) Actor In Crisis Management?" Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12608003/index.pdf.

Full text
Abstract:
The objective of this thesis is to analyze whether the EU can be considered as a &lsquo
limited&rsquo
military/strategic actor or as a civilian actor in the Post-Cold War international security architecture. In this framework, the impacts of the September 11 terrorist attacks and the US-led war in Iraq on the EU crisis management capabilities are analyzed more specifically. In this framework, firstly, the historical dynamics of European foreign and security policy from the Post-World War II period to the Post-September 11 period are analyzed. Secondly, the EU&rsquo
s changing role in the international arena together with its crisis management capability is evaluated. Thirdly, the EU&rsquo
s international actorness in the Post-September 11 era is discussed with a special reference to the US-led war in Iraq. In this general framework, following a brief analysis on reactions of the US and the EU against global terrorism, crisis management strategy of the EU during and after US-led war in Iraq is analyzed in detail. The last part allocated to, a critical analysis of the security actorness of the EU is made in order to conceptualize it and to draw a more theoretical framework. Moreover, it is mentioned in this thesis that while having triggering effect on the CFSP and ESDP, the 9/11 events and the US-led war in Iraq provides the emergence of new methods for crisis management and the European Security Strategy. Accordingly, considering the new international security context beginning with the end of Cold War period and transforming to another dimension by means of September 11 attacks, the main argument of this thesis is that the EU still tends to be a civilian actor as it was before and it is envisaged to be so in the foreseeable future despite its latest attempts to develop its common security and defence policies.
APA, Harvard, Vancouver, ISO, and other styles
50

Dua, Akshay. "Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications." PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1425.

Full text
Abstract:
Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for more integrity, or vice versa. We apply the trust-but-verify approach to three different classes of online applications and show how it can enable 1) high-integrity, privacy-preserving, crowd-sourced sensing 2) non-intrusive cheat detection in online games, and 3) effective spam prevention in online messaging applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography