scholarly journals The Information/Knowledge society as Risk Society : Assessing and Enforcing IT safety and security standards for IT systems : about responsibility of experts and governments

Author(s):  
Klaus Brunnstein
Author(s):  
Luminita Serbanescu ◽  
Magdalena Radulescu

All companies need information in order to make decisions. There is usually too much data spread in the IT systems of the company, but transforming the data into information that can be analyzed in order to make decisions is a difficult process. Considering the demands imposed by the knowledge society, each organization strives to become an intelligent organization and, by the means of new and innovative Business Intelligence(BI) strategy, to gain a market competition advantage. The new BI era integrates information into the decision process through the means of decision services, relates business processes to business rules that may be changed at any time, and integrates BI benefits to capabilities provided by teamwork, cooperation, and business process management. In this article, the authors present a BI solution, implemented through QlikView Application, thanks to which it is possible to analyse the employee expenses and for management sales.


2020 ◽  
Vol 245 ◽  
pp. 07058
Author(s):  
Mizuki Karasawa ◽  
John Hover ◽  
Shigeki Misawa

BNL SDCC (Scientific Data and Computing Center) recently deployed a centralized identity management solution to support Single Sign On (SSO) authentication across multiple IT systems. The system supports federated login access via CILogon and InCommon and multi-factor authentication (MFA) to meet security standards for various application and services such as Jupyterhub / Invenio that are provided to the SDCC user community. CoManage (cloud-based) and FreeIPA / Keycloak (local) are utilized to provided complex authorization for authenticated users. This talk will focus on technical overviews and strategies to tackle the challenges/obstacles in our facility.


2012 ◽  
pp. 253-275
Author(s):  
Luminita Serbanescu ◽  
Magdalena Radulescu

All companies need information in order to make decisions. There is usually too much data spread in the IT systems of the company, but transforming the data into information that can be analyzed in order to make decisions is a difficult process. Considering the demands imposed by the knowledge society, each organization strives to become an intelligent organization and, by the means of new and innovative Business Intelligence(BI) strategy, to gain a market competition advantage. The new BI era integrates information into the decision process through the means of decision services, relates business processes to business rules that may be changed at any time, and integrates BI benefits to capabilities provided by teamwork, cooperation, and business process management. In this article, the authors present a BI solution, implemented through QlikView Application, thanks to which it is possible to analyse the employee expenses and for management sales.


Author(s):  
Gil Ariely

This chapter applies the conceptual framework of knowledge management (and vehicles familiar from that discipline) to analyze various aspects of knowledge as a resource for terrorist-organizations, and for confronting them, in the post-modern era. Terrorism is a societal phenomenon, closely integrated with changes in our knowledge society. Terrorist organizations became knowledge-centric, networked organizations, with a post-modern approach to organizational paradigms. Cyberspace is habitat for knowledge and information, and terrorists are knowledge workers proficient in it. Cyber terrorism is the convergence of cyberspace and terrorism, and is closely entwined with “nonvirtual” terrorist activities and global terrorism. IT allows terrorists similar societal power-shift – from large organizations to small groups and individuals. The chapter reviews the changing nature of terrorism towards postmodern terrorism and towards “learning terrorist organizations” implementing knowledge, cyber terrorism and cyber planning. Since it takes a network to beat a network, the chapter discusses knowledge and knowledge management (KM) in counterterrorism. Through ‘NetWar,’ conducted also in cyberspace (not necessarily aimed at the IT systems it uses as a platform—but rather at human lives), implementing familiar vehicles from the KM toolkit such as social network analysis (SNA), to KM in intelligence and KM in low intensity conflicts. Knowledge management proves salient both for terrorism and for countering it in a knowledge society.


1996 ◽  
pp. 54-55
Author(s):  
Petro Yarotskiy

The Society "Knowledge" of Ukraine began the activity of the Department of Religious Studies. The Council of Lecturers is formed consisting of 24 people, among them are well-known philosophers, historians, sociologists - religious scholars: Doctors of Philosophy B.Lobovik, M.Zakovich, A. Kolodnyy, Yu.Kalinin, P.Kosuha, M.Rybachuk, P.Yarotsky, candidate of philosophical sciences M. Babiy, S. Golovashchenko, V. Yelensky, M.Kyryushko, O.Sagan, V.Suyarko, L.Filipovich and others.


2008 ◽  
Vol 1 (2) ◽  
pp. 200-212
Author(s):  
ELIZABETH BULLEN

This paper investigates the high-earning children's series, A Series of Unfortunate Events, in relation to the skills young people require to survive and thrive in what Ulrich Beck calls risk society. Children's textual culture has been traditionally informed by assumptions about childhood happiness and the need to reassure young readers that the world is safe. The genre is consequently vexed by adult anxiety about children's exposure to certain kinds of knowledge. This paper discusses the implications of the representation of adversity in the Lemony Snicket series via its subversions of the conventions of children's fiction and metafictional strategies. Its central claim is that the self-consciousness or self-reflexivity of A Series of Unfortunate Events} models one of the forms of reflexivity children need to be resilient in the face of adversity and to empower them to undertake the biographical project risk society requires of them.


Sign in / Sign up

Export Citation Format

Share Document