security regulations
Recently Published Documents


TOTAL DOCUMENTS

122
(FIVE YEARS 29)

H-INDEX

13
(FIVE YEARS 1)

2022 ◽  
Vol 5 (1) ◽  
pp. 37
Author(s):  
Luis Fernando Muñoz González ◽  
Ana María Paredes Arriaga

Outsourcing has been a very commonly used strategy to increase productivity in a variety of organizations. In Mexico, it can be said that it has had a positive impact on employment rate. Nevertheless, there is a “dark side” in this strategy, since it has been used as a way to avoid direct hiring of employees and to evade fiscal and social security regulations. This document aims to analyze outsourcing from a regulatory and contractual approach, as well as its role as a way to increase the employment rate, and from a managerial perspective. As a result of this analysis, it was found that in our country outsourcing has been a successfully used strategy by many organizations of different sizes, but at the same time, the lack of an appropriate legislation has originated a series of unethical practices. In Mexico, in 2021 a new legal framework that tries to balance the relationship between firms and employees was approved. This paper ends with a reflection of the possible impacts of this new legislation.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Kai Gao ◽  
Lijun Ma

This paper conducted an evolutionary game model of the interaction between the governments and communication enterprises and analyzed the impact of the government’s communication security regulation on the innovation decision-making of communication enterprises. The results show that the behavior of the governments depends on the social benefits, rent-seeking benefits, and regulating costs in strict and de security regulations. The communication enterprises’ behavior depends on the benefits of innovation and the costs in R&D and rent-seeking. When government subsidies are relatively inadequate, the communication enterprises’ strategy under government security regulation swings from not-innovation finally to innovation. The policy implications of this study indicate that appropriate de security regulation by the government will help communication enterprises generate a good atmosphere for innovation, and the appropriate increase in subsidies will be more conducive to driving enterprise innovation.


2021 ◽  
Vol 1 (80) ◽  
pp. 199-216
Author(s):  
Weronika Jakubczak ◽  
Hon-min Yau

The authors of the article focus on the main trends observed within cyber security regulations of Taiwan (Republic of China). In fact, Taiwanese governmental websites faced approximately 5 million attacks every day in 2021 [8]. Despite these attacks, the Taiwanese government operates in a steady way to improve its cyber capability, progressing on its cyber security increase path. The main document behind it in the form of strategic regulation is the National Cyber Security Program of Taiwan (NCSP 2021–2024). It explains the structure of the entities responsible for cyber security and describes both goals that have been accomplished and the ones that are/will be implemented. In particular, Taiwan focuses on providing higher cyber security protection standards, including critical infrastructure elements, private-public cooperation, the use of new technologies, and scouting for new talents. International collaboration is also highly valued as an example of joint cyber exercises between Taiwan and the USA in 2019.


2021 ◽  
Vol 9 (2) ◽  
pp. 215-229 ◽  
Author(s):  
David Chandler

A Narrative of the Sufferings of Maria Bennett, a crudely printed, eight-page pamphlet, was published in Dublin in spring 1846. It has been interpreted as an early fiction concerning New Zealand, or alternatively as a New Zealand ‘captivity narrative’, possibly based on the author’s own experiences. Against these readings, it is argued here that Maria Bennett, more concerned with Ireland than New Zealand, is a piece of pro-British propaganda hurried out in connection with the British Government’s ‘Protection of Life (Ireland) Bill’ – generally referred to simply as the ‘Coercion Bill’ – first debated on 23 February 1846. The Great Famine had begun with the substantial failure of Ireland’s staple potato crop in autumn 1845. This led to an increase in lawlessness, and the Government planned to combine its relief measures with draconian new security regulations. The story of Maria Bennett, a fictional young Irishwoman transported to Australia but shipwrecked in New Zealand, was designed to advertise the humanity of British law. Having escaped from the Māori, she manages to get to London, where she is pardoned by Sir James Graham, the Home Secretary, the man responsible for the Coercion Bill. New Zealand, imagined at the very beginning of the British colonial era, functions in the text as a dark analogy to Ireland, a sort of pristine example of the ‘savage’ conditions making British rule necessary and desirable in the first place. A hungry, lawless Ireland could descend to that level of uncivilization, unless, the propagandist urges, it accepts more British law.


Author(s):  
M. Gayathri ◽  
C. Malathy

Nowadays, a demand is increased all over the world in the field of information security and security regulations. Intrusion detection (ID) plays a significant role in providing security to the information, and it is an important technology to identify various threats in network during transmission of information. The proposed system is to develop a two-layer security model: (1) Intrusion Detection, (2) Biometric Multimodal Authentication. In this research, an Improved Recurrent Neural Network with Bi directional Long Short-Term Memory (I-RNN-BiLSTM) is proposed, where the performance of the network is improved by introducing hybrid sigmoid-tanh activation function. The intrusion detection is performed using I-RNN-BiLSTM to classify the NSL-KDD dataset. To develop the biometric multimodal authentication system, three biometric images of face, iris, and fingerprint are considered and combined using Shuffling algorithm. The features are extracted by Gabor, Canny Edge, and Minutiae for face, iris, and fingerprint, respectively. The biometric multimodal authentication is performed by the proposed I-RNN-BiLSTM. The performance of the proposed I-RNN-BiLSTM has been analysed through different metrics like accuracy, f-score, and confusion matrix. The simulation results showed that the proposed system gives better results for intrusion detection. Proposed model attains an accuracy of 98% for the authentication process and accuracy of 98.94% for the intrusion detection process.


Challenges ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 30
Author(s):  
Emelie Mannebäck ◽  
Ali Padyab

The COVID-19 pandemic of 2019 surprised information security practitioners in the organizations due to the change imposed on employees’ work routines. Employees were asked to work from home, and therefore changes were necessary to reduce information security risks actively. The abrupt change of work environments brought many challenges to the practitioners, which caused them to make decisions regarding organizational information security. This article aims to uncover those challenges through an ethnography study within an organization during the fourteen months of teleworking. On an overarching level, we found four challenges to be of concern: technical security, regulations and policies, employee awareness of security issues, and, finally, preparedness for the new work environment of teleworking. We believe that the challenges brought by the analysis will inspire discussions about the future of research and practice regarding information security management in case of disasters.


2021 ◽  
Vol 11 (22) ◽  
pp. 10576
Author(s):  
Tian-Fu Lee ◽  
I-Pin Chang ◽  
Ting-Shun Kung

A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required. Therefore, the security of data in transmission has been attracting increasing attention. In recent years, blockchain technology has also attracted more attention. Relevant research has been published at a high rate. Most methods of satisfying relevant security-related regulations use modular and exponential calculation. This study proposes a medical care information preservation mechanism that considers the entire process of data storage in devices from wearable devices to mobile devices to medical center servers. The entire process is protected and complies with HIPAA privacy and security regulations. The proposed scheme uses extended chaotic map technology to develop ID-based key negotiation for wearable devices, and thereby reduces the amount of computing that must be carried out by wearable devices and achieve lightness quantify. It also uses the non-tamperability of the blockchain to ensure that the data have not been tampered with, improving data security. The proposed mechanism can resist a variety of attacks and is computationally lighter than the elliptic curve point multiplication that has been used elsewhere, while retaining its security characteristics.


2021 ◽  
pp. 605-623
Author(s):  
Patrick Emmenegger ◽  
Paul Marx

The regulation of job security is an important, but understudied, aspect of the welfare state. This contribution reviews academic debates that aim to explain the development of job security regulations across time and countries. While earlier debates focused on dismissal protection as an issue contested between capital and labour, the varieties-of-capitalism approach has emphasized the complementarity between job security regulations and the production models in coordinated market economies. Recently, political economists have begun to discuss diverging regulatory trajectories for open-ended and temporary employment contracts. This is argued to produce ‘labour market dualism’ and conflicts within the working class between ‘insiders’ and ‘outsiders’. The labour market crisis that began in 2008 seems to have changed the politics of job security regulations in those countries that were heavily affected.


Author(s):  
Bambang Prayitno

AbstractThe credit union (CU) movement is very developed currently, including CU Sawiran, a credit unionthat exists to serve all members of society openly without exception. Problems that often occur arethat CU Sawiran as a creditor do not get clear information/data regarding the object of materialguarantee, among others, the certainty of the completion time of conversion processing if the letter C/ clerk D is submitted so that it is difficult to execute. So far, the solution used is through mediationamong the parties. This community service program aims to provide information to CU Sawiranranks, administrators, supervisors and staff regarding the right to information dealing with theobject of material security, the development of material security regulations, the role of theFinancial Services Authority as the supervisor of financial services institutions (LJK) with regard tomaterial security, and the method of drafting a good agreement. Assistances are conducted byanalyzing credit agreements and formulating agreements that are more informative and do not havemultiple interpretations. It was agreed that similar activities would be carried out periodically notonly for the management but also for the other parties in order to improve education in the field oflaw. AbstrakGerakan Credit Union saat ini sangat berkembang, gerakan ini merupakan suatu model yangsangat sesuai bagi kondisi masyarakat. CU Sawiran, hadir untuk melayani semua anggotamasyarakat secara terbuka, tanpa kecuali. Semua orang bisa menjadi anggota tanpa memandangtingkat ekonomi, pendidikan, agama, suku dan budaya. Saat ini CU Sawiran ada di 13 tempatpelayanan di beberapa kota di Jawa Timur. Permasalahan yang sering terjadi CU Sawiran selakukreditur tidak memperoleh informasi/data mengenai objek jaminan kebendaan secara jelas antara lainmengenai kepastian waktu selesainya pengurusan konversi jika yang diserahkan letter C/petok Dsehingga kesulitan melakukan eksekusi karena masa pengurusan belum selesai. Saat akan eksekusibenda diperalihkan kepada pihak ketiga tanpa sepengetahuan kreditur. Penyelesaian yang digunakanselama ini untuk menangani masalah di atas yakni melakukan mediasi mencari solusi yang terbaikbagi kepentingan para pihak.Dari hal di atas, program pengabdian masyarakat ini bertujuan memberikan informasi kepadaJajaran CU Sawiran, pengurus, pengawas dan staf (1) mengenai hak atas informasi mengenai objekjaminan kebendaan; (2) perkembangan aturan jaminan kebendaan; (3) peran lembaga Otoritas JasaKeuangan sebagai pengawas lembaga jasa keuangan (LJK) berkaitan dengan jaminan kebendaan; (4)memberikan cara penyusunan perjanjian yang baik kepada Jajaran CU Sawiran, pengurus, pengawasdan staf sesuai syarat sahnya perjanjian khusunya hutang piutang, tanpa adanya klausula perbuatanmelawan hukum (PMH). Hasil kegiatan sangat bermanfaat, peserta antusias mengikuti dan aktifdalam sesi tanya jawab seiring sejalan dengan dinamika hukum serta hak atas informasi mengenaiobjek jaminan kebendaan. Pendampingan dengan melakukan analisis perjanjian kredit di CU Jurnal Asawika Volume Volume 06 No.01 37Sawiran serta memformulasi perjanjian yang lebih informatif serta tidak multi tafsir. Kegiatan serupadisepakati akan dilakukan secara periodik tidak hanya diikuti pengurus saja namun juga pihak lainguna meningkatkan edukasi di bidang hukum.


Author(s):  
P.D. Guyvan

This scientific article is devoted to the study of an important issue on the essential and temporal characteristics of regulatory and protective civil legal relations. In operation it is necessary that the factor of time in different ways affects the essence and existence of both regulatory and protected legalization. A comparative study of the term of their existence is carried out, similar and excellent features are identified. It is noted that in contrast to the estab-lished mechanisms for regulating the time measurements of interactions in an undisturbed state, with the scientific postulation of existence / implementation of security and legal powers there are numerous problems. And the first of them is that the overwhelming majority of researchers practically identify the terms of protection of violated sub-jective law with a lawsuit. So the author advocates the thesis, the lawsuit and the period of protection of protection rights are not the same. Only the realization of claims are not limited to the security of the person in case of viola-tion of its rights. If a person made its own law, presenting a lawsuit for a court period, which means that it has been able to realize its security rights requirement for a faulty debtor by means of state coercion. If not, then its security right will still continue although without the ability to enforce. But, in any case, regardless of whether the belief of the judiciary or an extrajudicial way to protect its impaired material law, the duration of compulsory or voluntary realization of its security powers does not fall under the influence of a different institute. Therefore, ways to solve the problem of distinguishing security terms, providing various definitions and legal provision of periods of imple-mentation of security regulations, which arises as a result of and at the time of the offense, and the element of this law - the claim, which provides an appropriate result with the use of state coercion. Proposals for systematization of material terms are made, based on the effects of their expiration regarding the possibilities of implementing the legal status of the carrier.


Sign in / Sign up

Export Citation Format

Share Document