Employing Dynamic Models to Enhance Corporate IT Security Policy

2012 ◽  
Vol 4 (2) ◽  
pp. 42-59
Author(s):  
Nathan A. Minami

Since 9/11 and the creation of the U.S. Patriot Act, the intrusion of government surveillance into the lives of ordinary Americans has become a topic of great concern to many citizens. While many Americans view surveillance as a necessity in the name of national security, the government is not the only organization conducting surveillance. As technological capacity increases, an increasing number of employers are implementing technologies that allow them to maintain vigilance over the actions of their employees in the workplace. Despite many attempts to implement surveillance technologies, there is little evidence that companies are any safer now than they were ten years ago. This paper demonstrates how System Dynamics modeling can be utilized to help model the insider threat as a system. It provides analysis of the non-linear affect of decision making, assessing the 2nd, 3rd, and 4th order impacts of decisions, and demonstrates the important impact of delays in the system. A mathematical model is presented and simulations are conducted to determine the likely affect of company decisions and individual agent behavior.

Clean Energy ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 254-272
Author(s):  
C Palanichamy ◽  
P Naveen

Abstract In 2018, the Government of India approved the establishment of the New All India Institute of Medical Sciences (AIIMS) in Thoppur, Madurai, Tamil Nadu, India. As the most important amenity for continuing primary care and rescue response is a healthcare facility, a secure electricity supply becomes an imperative necessity. Hence, as the energy supplier for the new AIIMS, Madurai, this paper proposes a microgrid combined with the utility grid. The microgrid consists of a 4-MW photovoltaic system, a 1.8-MW wind-turbine energy-conversion system, a backup diesel generator capable of meeting the forecasted maximum demand and a 1-MW battery energy-storage system. The AIIMS Microgrid will have a service providing a capacity of 20 MVA following integration with the utility grid. The proposed microgrid would be the first attempt at healthcare facilities in India since its first day of work to ensure the availability of electricity. It would have a 9.8% return on investment, a 13.6% internal rate of return and a payback period of 6.75 years once it is operational, as well as an attractive levelized cost of energy (LCOE) of USD 0.07547/kWh. It would provide an environmentally friendly atmosphere by avoiding an annual emission of 6 261 132 kg of carbon dioxide, 27 362 kg of sulphur dioxide and 12 838 kg of nitrogen oxides as compared to power supplied entirely from the utility grid.


1990 ◽  
Vol 19 (1) ◽  
pp. 5-20
Author(s):  
Larry W. Bowman

Relationships between U.S. government officials and academic specialists working on national security and foreign policy issues with respect to Africa are many and complex. They can be as informal as a phone call or passing conversation or as formalized as a consulting arrangement or research contract. Many contacts exist and there is no doubt that many in both government and the academy value these ties. There have been, however, ongoing controversies about what settings and what topics are appropriate to the government/academic interchange. National security and foreign policy-making in the U.S. is an extremely diffuse process.


2020 ◽  
Vol 35 (2) ◽  
Author(s):  
Bruce Whitehouse

Mali's coup d'état in March 2012 and the subsequent occupation of northern Mali by Islamist and separatist rebels took many observers by surprise. How could an erstwhile model of peaceful democratic transition collapse so swiftly? Why did so few ordinary Malians stand up in defence of their 20-year-old democracy? Combining accounts from Malian and foreign journalists with observations made in Bamako leading up to and during the dramatic events of early 2012, this article assesses the failures of Mali's pre-coup political system. A combination of the tenuous rule of law, weak state institutions, and perceptions of systemic corruption deeply eroded Malians' faith in their democracy. The junta that ousted Mali's elected president in March 2012, despite its international isolation, skillfully manipulated public frustrations with the government as well as local symbols and discourses pertaining to heroic leaders to gain support and legitimacy at home. The crisis in Mali was preceded by certain warning signs, some of which might be applied to gauge the health of democratic transitions elsewhere in Africa.


1983 ◽  
Vol 31 (4) ◽  
pp. 313-323 ◽  
Author(s):  
C.T. de Wit ◽  
F.W.T.P. de Vries

For the simulation of organ formation and assimilate partitioning, information is required on the current level of activities like CO2 assimilation and the growth of various organs, as well as state variables such as leaf and root wt., N content and carbohydrate reserves and exogenous variables like radiation and temp. This information may be retained in auxiliary state variables by considering the dynamic equilibrium between growth of roots and shoots. Auxiliary state variables are not tangible quantities but mathematical artefacts of the simulation program; it is speculated that in real plants similar information may be retained and transferred by the hormonal system. A hormonal system is a communication system and such systems may be analysed either in terms of means (of the hardware used) or in terms of purpose (of the messages transferred). In dynamic models of crop growth, interest should be focused on the latter. Wheat, maize and ryegrass are used as examples. (Abstract retrieved from CAB Abstracts by CABI’s permission)


2020 ◽  
Vol 3 ◽  
Author(s):  
Syed A Jilani

The exit of nurses from the Irish healthcare system is a growing concern especially coupled with the ageing population of Ireland. The article explores the many reasons nurses are leaving the country: mainly the disrespect by management, unfair compensation and the shortage of staff leading to professionals being overworked and eventually experiencing burnout. For many professionals, it has become an issue of their own physical and mental well-being. There are a few recommendations discussed to solve the issue of nurses, which includes a strong push to change perspectives of management and a change of policy by the government. These include retraining healthcare management, an emphasis on hiring and retaining nurses by increasing incentives and making the workload easier to carry.


2015 ◽  
Vol 12 (4) ◽  
pp. 801-808
Author(s):  
Kenneth Carlberg

Abstract This paper proposes a new direction for U.S. Government cyber policy focusing on stimulus that indirectly incites actions by others to improve cybersecurity protection. To date, the U.S. government has relied on two directions to establish a foundation for cyber security policy: legislative and informative. The former is realized as legislative laws or regulation that provide specific direction to companies or the general public. The latter involves the production and dissemination of information, which is realized in three forms: guidelines, response efforts, and testbeds/pilots. This paper proposes a new “carrot and stick approach” that incorporates both taxes and tax rebates to stimulate solutions that address problems without the government dictating a specific solution.


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


Sign in / Sign up

Export Citation Format

Share Document